Chủ Nhật, 29 tháng 12, 2024

 


If the idea of running your own ring of spies sounds more like “spy-fi” than real world, think again. Thanks to Jefferson Mack, a career spy master, you can now use all the tricks of the world’s best spies to get the goods on the other guys—and keep them from doing it to you. Whether you need to find out who has been stealing your company’s marketing strategy or what your ex-spouse is up to, this practical, hands-on manual explains it in clear, easy-to-follow steps.

Running a Ring of Spies takes the reader on a wild ride through the treacherous world of spying, starting with a madam-turned-case agent in Bangkok who used her girls at the Easy Come Bar to extract secrets from U.S. GIs and officials and supplied the information to the Vietcong; to Aldrich Ames, the CIA employee who betrayed his country to the Soviet Union for money; to a passed-over employee in a fashion house, who got his revenge by selling top-secret designs to the competition. You’ll learn how to recruit, train, handle, and terminate a spy for whatever purposes you see fit; set up a security apparatus to detect and catch spies working for the other side; tap into private and corporate computers to find out what the other side has on you; and much, much more.

A PALADIN PRESS BOOK

ISBN 0-87364-902-8

Visit our Web Site at www.paladin-press.com

 

90000

 


s p1 e s

" spycraft and black operations in the real world of espionage

Jefferson Mack

 


Also by Jefferson Mack:

The Safe House:

Setting Up and Running Your Own Sanctuary

Underground Railroad:

Practical Advice for Finding Passengers, Getting Them to Safety, and Staying One Step Ahead of the Tyrants

Running a Ring of Spies:

Spycraft and Black Operations in the Real World of Espionage

by Jefferson Mack

Copyright © 1996 by Jefferson Mack

ISBN 0-87364-902-8

Printed in the United Slates of America

Published by Paladin Press, a division of

Paladin Enterprises, Inc.,

Gunbarrel Tech Center

7077 Winchester Circle

Boulder, Colorado 80301 USA +1.303.443.7250

Direct inquiries and/or orders to the above address.

PALADIN, PALADIN PRESS, and the “horse head” design are ftademarks belonging to Paladin Enterprises and registered in United States Patent and Trademark Office.

All rights reserved. Except for use in a review, no portion of this book may be reproduced in any form without the express written permission of the publisher.

Neither the author nor the publisher assumes any responsibility for the use or misuse of information contained in this book.

 


Contents

Chapter One

The Easy Come Bar 1

Chapter Two

Spying Has One Purpose 11

Chapter Three

The Basic Principles of Spying 17

Chapter Four

Who Is a Spy and Who Is Not 23

Chapter Five

The Making of a Traitor 35

Chapter Six

The Art of Deception 49

Chapter Seven

Exercises in Deception and Intelligence Collection 65

 


Chapter Eight

It's More Than Telling Lies 75

Chapter \ine

The Case Officer at Work 97

Chapter Ten

When a Private Citizen Recruits 105

Chapter Eleven

Surveillance 119

Chapter Twelve

The Basic Steps: Phase One 125

Chapter Thirteen

The Basic Steps: Phase Two 143

Chapter Fourteen

The Security Aspect 157

Chapter Fifteen

Case Studies 181

Conclusion

The Successful Spy 201

VI RUNNING A RING OF SIMES

 


Chapter One

The Easy Come Bar

rp he Easy Come bar wasn’t the favorite spot of the I thousands of GIs who took their R&R in Bangkok A in 1969. Most Viet vets who spent time in Thailand will remember such places as the Hollywood. Thai Heaven, the Miami, the Green Dragon, and the California.

The Easy Come sat by itself, almost at the end of New Phetburi Road. For a GI bar in the R&R years, it was a small place, just a bar with six stools and four booths along one wall. I walked into the place one afternoon looking for possible spouts—the water taps of information in the business of for¬eign intelligence collection. 1 was working for one of a dozen different agencies in the alphabet soup of spies and diplomats that stalked the streets of Bangkok while war raged a few hun-dred miles to the east.

I sat in a booth, ordered a beer, and pretended for the moment that I didn't understand a word of Thai as three pret¬ty girls slid into the booth with me, one beside me and two on the seat across from me. 1 fended off questions about where I was from and how many hours I had been in Bangkok while I slowly sipped a Singha beer. As the girls chattered on, I looked the place over while 1 listened to what they were telling each other whenever they spoke their own language.

1

 


I also rook a good look ar the Mamasan—the woman who managed the girls and cook the money when a customer decided to buy a girl out for the evening. A tall, pretty Eurasian woman in her early thirties, the Mamasan sat behind the bar, watching with dark brown eyes everything that hap¬pened around her.

The Mamasan caught me looking at hei and she smiled. Ĩ decided instantly that I was going to do my off-duty drinking in the Easy Come until 1 got to know her a whole lor better. I've always had a thing for smart, competent, strong, good¬looking women. 1 left the girls sitting in the booth and walked over to the bar. carrying my bottle of Singha.

She looked up and focused on me as I asked her what her name was.

“Connie, with no last name,” she told me and went back to working on the account book.

It took another four visits belore she started talking enough ro tell me her father had been a Dutchman who had lived in Thailand. He had taken Connies Thai mother as his wife a few months before the Japanese captured and killed him during World War IT. She had grown up poor and claimed she had opened the bar with money won in the Thai lottery.

I told her that 1 was a bright young American sociologist working with the Defense Advanced Research Projects Agency (DARPA) and was trying to discover how the Thai government could win the hearts and minds of its rural popu¬lation before the Commies took over.

Maybe it was my suspicious nature, maybe it was because I was trying to learn everything possible about the spy busi¬ness. but the more afternoons and evenings 1 sat in the Easy Come, sipping on a beer in a back booth and watching the parade of GIs on R&R and how well the girls handled them, the more what started as a tiny suspicion burning in the back of my mind became an open flame.

Counterintelligence wasn’t my game in those days, so when I couldn’t fight off the suspicion anymore, 1 took a lieu¬

2

RUNNING A RING OP SPIES

 


tenant colonel working in Military Assistance Command. Thailand (MACTHA1) with one of the military intelligence services into the Easy Come fur a beer one afternoon.

Al first, George concluded there was no way Connie might he what 1 was afraid she was. Then, a couple of weeks later, an excited George walked into my office and cold me he'd spotted Connie sitting with a group of American officers and their wives in the officers club ar the Chao Praya hotel. Wondering what an R&R bar Mamasan was doing mixing with the American military elite, George asked one of those officers about the beautiful Thai woman and learned that Connie was a good friend of several military wives whom she had met in one of the Christian churches in Bangkok. None of the officers’ wives appeared to have any idea that Connie was a successful R&R madam on New Phciburi Road.

The new information made George as suspicious about what Connie really was as I had been. Because he didn’t think Il wise that he go back into lhe Easy Come, he asked me to keep dropping in on Connie and play ing rhe dumb government civilian hoping for an impossible love. Thai was fine with me. and after a while Connie and I got 10 be very good friends—to rhe point where 1 learned that while all those American wives thought Connie was a devvui Christian, a large bronze statue of Buddha sal on a pedestal in one corner of her bedroom.

To this day George can‘r prove that Connie was doing what we both decided she had 10 be doing, but she was prob¬ably one of the most clever intelligence case officers w ho ever worked the business.

George never was sure for whom she was working. Cither. I: could have been the Russians, Red Chinese, or North Koreans, or she might even have been an independent intel-ligence entrepreneur. But whoever she served, the gobs of information Connie’s girls squeezed, fondled, and drew out of the parade of Gls who wandered into the Easy Come almost certainly went straight to Hanoi.

The dozen girls who worked in the Easy Come at any one

THE EASY COME BAR

3

 


time were all a hit prettier, a lot more enthusiastic at love¬making. and a whole lot smarter than (he average girl just off the farm servicing GIs in (he other places along the Phetburi strip. Connie's girls all spoke English, although sometimes heavily accented, but always well enough to ask questions and listen carefully while a guy fresh from a good orgasm bragged about what a great soldier he was.

The Easy Come girls were great actors who could sell an illusion of love as quickly as Houdini could slip out of hand-cuffs. Most of (he time, a grunt who spent a night With one of Connie’s girls didn’t go looking for love anywhere else for rhe remaining days of his R&R- If he did want a change of vagi¬nas, he went hack to the Easy Come to find it. At least once a week, some soldier left town in desperate love with one of the Easy Come girls. Many of them kept writing rhe girl for weeks and months after their R&R. A few signed up for an extra tour in ’Nam just so (hey could get a 30 day leave and take It in Bangkok in (he arms of one of Connie’s girls.

It wasn't just vets from Vietnam who found the Easy Come. There were 40,000 I .s. airmen stationed in Thailand during those years, and a couple of thousand members of the other armed services worked out of the Joint United States Military Assistance Group (JUSMAG) and MACTHAI com¬pound located near the U.S- Embassy on Wireless Road. Most of them considered a visit to the R&R bars the worst kind of slumming, but if they happened to stumble into rhe Easy Come. Connie made sure they found something a little extra special that brought them back time and again. I know- of four different girls from the Easy Come who married Bangkok¬based Gls during the years 1 tracked events in the bar. and at least half a dozen more who did tour-long shack-ups with L .$. military personnel. Every time a gill left to take up 3 full-time love situation. Connie would find another who fit the special personality of the Easy Come girls.

Probably 99 percent of the grunts who found the Easy- Come didn't have much worth knowing locked up in their

4

Hl INNING A RING OF SPIES

 


gonad-driven brains. Bur it was a dirt-cheap spy network with the U.S. GIs paying for most of the cost out of the money they had saved for months before getting a seat on an R&R flight Connie was learning details about unit size and location, patrol operational techniques, ambush methods, unit morale prob¬lems, pending troop movements, beach defenses, river patrol routes. G1 black market activities, and damn neat anything else a GI might know about how America was fighting the war in Vietnam.

As for the guys stationed in Thailand, every secret know n in the JL'SMAG compound, including planned bombing tar¬gets in Laos, was at risk any time a soldier stepped into the Easy Come.

Connie had that knack for spotting a potential payoff that makes a ease officer a master of the trade. Once in a while, one of the R&R customers would let it slip that he W3S work¬ing someplace important, like maybe the Military Assistance Command. Vietnam (MACV) compound in Saigon or a brigade headquarters up nonh. Marks like chat went back to Vietnam and would soon thereafter meet a little Vietnamese honch girl, or maybe even a European female employee with some international aid organization who seemed to know' instinctively just exactly what the young man liked when it came ro loving. None of the Americans had any reason to sus¬pect that their sudden good luck in Saigon was directly tied to their R&R and rhe girls they left behind in Thailand.

Occasionally, someone would spill something big. George was sure that one of Connie's customers let slip the wrong bit of information back in Saigon to a French secretary working for a trading company, which resulted in 3 sapper attack that killed an Army of Vietnam (ARVN) two-star general in an explosion in a Saigon restaurant. I’ll always be convinced that ir was another of Connie s customers who blew the informa¬tion about the surprise attack into Cambodia that allowed the Vietcong command structure to disappear before the troops got to the target.

5

THE EASY COME BAK

 


Connie wasn’t just working the R&R trade either. Playing her second role as rhe devour Christian Eurasian, she was doing all sorts of friendly things to help the L'.s. military and embassy wives she met at church on Sunday survive the expa¬triate life in Bangkok. She arranged up-country trips to old temples, set up cultural nights where the Americans could watch Thai dancing, and even organized a Thai-American Buddhist study group.

She also helped rhe American ladies find household help. The Thai women whom Connie sent around co work as cooks, maids, and baby-sitters weren’t quite as young and pretty as the girls sitting al the bar in the Easy Come, but they were bright, they spoke passable English, they worked hard, they Treated the faranz (American or European) kids with lots of love, and they didn’t steal. Although none of the wives ever figured it our, or perhaps didn't want tu admit it even to themselves. Connie’s maids were also ready and willing co give the man of rhe house a quick tasrc of Thai love in the servants’ quarters while his wife was off studying Thai culture with Connie.

George’s military spooks never told the Thai government what they were sure Connie was doing. They didn’t issue any warnings to the troops or warn the gaggle of military and embassy u ives that their house servants were probably spying for (he Communists.

Smart intelligence officers don’t arrest, murder, or destroy (he public image of good spies. ’They either use them or neu-tralize them, bur they always try nor to let the spies know they have been made. In rhe spy game, the devil you know is a thousand times better (han the devil you dou r know. Destroy a spy ring you know about and a new spy ring you know- noth¬ing about will soon be watching you.

After I alerted George about my suspicions of Connie and the Easy Come, he set up a section in his 0W’n organization that did nothing but monitor Connie and her activities. For (he next two years, every G1 who wandered into the Easy Come was photographed and identified by someone working

6

RUNNING A RING OF SPIKS

 


for George. Those who were nothing but mud grunrs went back to 'Nam. fought the war. and lived or died without ever suspecting how close (hey had come to a major spy ring. Those who did have access to information of potential intelli¬gence value went back to Vietnam to find that new duties awaited them that kept their hands off classified documents and their asses much closer to real combat.

The same thing happened with the Bangkok officers' wives and their husbands who stepped into Connie’s web. Most of them were never told rhe truth about Connie. The wives kept going on up-country trips and sitting through cultural education classes while their housemaids taught then husbands the subtle differences between /Vsian and American feminine anatomy.

A few guys did get sudden transfers, like one L.s. Air Force embassy attache I personally knew who suddenly found himself flying combat missions out of Ubon while his family went back to the States.

Connie kept collecting a lot of information, some of it probably useful to those who received her product. What else was happening was that George s counterintelligence group starting feeding Connie’s girls bits and pieces of false infor-mation. .Some of the guys filtering into the Easy Come or encouraging their wives to rake one of Connie s up-country trips knew exactly what they were doing—participating in what eventually became the single most effective disinforma¬tion campaign we had going in Southeast Asia until rhe rime we pulled out of’Nam.

For example, a rumor once suddenly flashed through the MACTHA1 compound that enrire companies in 1 Corps were unable ro climb out of bed because of a new and virulent

mutation of pcnicillin-resisranr gonorrhea spreading through the troops. Within days, the officers’ wives were all talking about it as they took one of Connie’s up country trips. A week later, a Vietcong battalion launched a series of surprise attacks in 1 Corps expecting to catch sick troops not fir for combat. They died on the wire in droves.

THE EASY COME BAR

7

 


On another occasion, one of the U.S. Army's best snipers and his spotter took an R&R at the same time in Bangkok and went straight from their hotel to the Easy Come. Five days later, on the last night of a glorious time, the two of them got skunk drunk with two of Connie's girls and started talking to each other about their plans for taking out a key North Vietnamese battalion commander.

If the two men had really done what they talked about doing that night in Bangkok, they would have walked straight into an ambush. Instead. B-52s carpet-bombed rhe area, churning into hamburger two companies of rhe crack northern troops committed to rhe ambush.

This was an especially successful counterintelligence operation because George doubled Connie’s entire spy ring without making any direct contact with a single member of the enemy network, a real coup in the intelligence game. While it IS almost impossible to estimate rhe actual impact of the clever use of human resources in any spy operation, Connie unknowingly passed on enough false information that she probably did more for the U.S. war effort than many of the intelligence case officers working on our side.

Like all good things, ir didn’t last forever. Eventually, some general in Hanoi must have begun to Suspect that the information supplied by Connie’s spy ring was no longer as valuable as ir had once been and that much of it not only proved to be inaccurate but it sometimes backfired. The more that happened, the less they could mist any information she produced for them.

In late 1971. 1 left Bangkok for a tour in another part of the world. The last time 1 dropped by to sec Connie, she looked nervous, almost like she was frightened about something. I had gone in the Easy Cornc for a last good-bye and to tell her a cover story that I was quitting my government contract job and going home to get a law degree. Weeks before that, she had started hinting that maybe we should get a lot friendlier than we already were, which was pretty damn friendly.

8

RUNNING A RING OF SPIES

 


Just before I got up from her bed to leave, she asked me why I didn’t marry her 3nd rake her with me to wherever 1 was going. It was a serious offer, and I might have taken her lip on it if there hadn’t been a wall of lies between US that neither of us could ever bicak down.

1 saw Connie once more in 1984 when I Spotted her in 3 shopping center in Crystal City, Virginia, just 3 few miles from the Pentagon. She was hanging onto rhe sleeve of a guy I rec- ■ ognized as someone who had been assigned ro MÀCTHA1 back in the war years as an army major in the civilian contract office. Two kids just short of thcii teens were ragging along I liehind Mama and Daddy as they looked at new refrigerators.

It's not hard to figure out how Connie ended up in the United States, married with children. George’s counterespi- I onage operation was so highly classified that Connie’s name I would have never been pul into any visa lookout files, nor the I lookout files of other agencies. The guy she married had no idea what his wife had done during the war years or how his I own government was using her without her knowing it.

As 1 stood watching her that day in Crystal City, 1 envied the guy just a bit. Then she turned and saw me standing there. She recognized me, but she neither smiled nor frowned. The man said something, and she turned, gave him II big smile, reached up. and kissed him on the cheek. When E'the finished the kiss, she turned and looked back at me for I just a second, making sure 1 had seen rhe kiss. Then she I turned and walked away, her arm looked with the arm of her American husband, a Norman Rockwell picture of (he pe rfect ■■Cross-cultural marriage.

Like all good intelligence case officers. Connie could Hkuild a great illusion and make it seem so real that it really I U.IS The son of a bitch looked as happy as any married man I I’ve ever seen who was taking the family on a shopping trip.

THE EASY COME BAR

9

 

 


Chapter Two

Spying Has One Purpose

K

nowing the enemy’s defense plans, the secrets of

a new weapon system. or rhe mental state of a

political leader Can cost or save thousands of

IVCS. depending on who has the knowledge and how they

iut It to use.

Good*spies can keep a government our of war. and incom-

etent spies can get a government into a war that can't be

'on. Governments don’t just spy on enemies threatening war.

lie Cold War is over, but both the CIA and the KGB are still

1 business, and (he intelligence case officers of dozens of dif-

uent countries recruit and run rings of spies trying to uncov-

tf trade secrets, political plots, and military plans, as well as

r plans of terrorist groups scattered around rhe world.

Governments also spy on their own citizens. The EB1 tries

infiltrate the Mafia and dozens of other organized criminal

>ups, and the IRS not only collects and examines (he finan-

I documents of most major corporations as well as millions

private citizens, but also actively recruits and pays snitches

Hing to rar on their friends and employers for profit.

11

 


ITS NOT JUST GOVERNMENTS

THAT HAVE REASON TO SPY

-Almost all of US will at some rime know something that will give us an advantage over someone else. Just as likely, we will sooner or later lose something dear and important to US because someone else found out something we thought only we knew about. Every one of US spies on someone else at one time or another.

A mother may listen in on a teenage son’s call to a gid' friend, hoping she will learn that (he girl is nor pregnant.

A man will drive by a girlfriend’s house to make sure she really is home with a cold.

A wife will carefully examine the dirty clothes her husband brought back from a trip out of town, looking for signs of lipstick or strands of blond hair.

An employee will sneak a look in rhe boss’ tile cabinet, try-ing CO find nut who will get the next promotion.

A father will check our his daughter’s boyfriend with a credit bureau.

ALMOST ANYONE CAN HAVE A

GOOD REASON TO RECRUIT SPIES

We can all face a situation in which someone has informa-tion we must have in order to survive or live well, and che only wav we can get it is to steal ir. Yer, most actions involved in stealing information—burglary, phone lapping, and bribery— are illegal acts with heavy punishments.

The safest wav to steal information is to recruit someone who has access to the information who can steal it for US with little risk. Here are just a few examples of how ordinary peo¬ple might recruit someone to spy on someone else.

A professional gambler wants an extra edge so he can bet the

12

RUNNING A RING OF SPIES

 


odds char others sec. He recruits as spies trainers, assistant coaches, secretaries, bus drivers, nfficc managers, and even custodians and janitors who work for professional and college Sports teams. His recruited spies provide bits and pieces of information on team morale, injuries, personality clashes, drug abuse, training practices, and any other information that might have an impact on the outcome of a game.

The .American Cancer Society recently discovered its pri¬vate papers, dating ro October 1979, in Philip Morris docu¬ments unveiled by The Avar Ỵork Timex and accused the tobacco industry of spying on the society in the 1970s to learn how it planned to address the idea of safer cigarettes.

Tom White is 3 successful lawyer who has spies W'orking for him in three of the major insurance companies that handle many of rhe claims of injured parties Tom repre¬sents in court. As a result of the insider knowledge his spies provide. Tom almost never goes to court. When he docs, he wins because he knows rhe Strengths and weak¬nesses of the other side’s case.

Dan Cocker has made several million bucks in the stock marker using insider information he collects from a half- dozen spies working in major investment firms.

WHAT (X)VERNMENT

SECRETS SHOULD YOU KNOW?

Americans don’t just have good reasons for spying on each Other Just as an intrusive government spies on its own citi¬zens, so citizens often have good reason to spy on their gov¬ernment. The Mafia has been doing it for years.

Various acrion groups across the political spectrum, rang- ■w from leftist radicals trying to discover GIA covert opera¬tions in Larin America Co the new citizen militia groups wor- ned about the Bureau of Alcohol. Tobacco and Firearms, are spying on government agencies.

Persons who are called investigative reporters arc often

13

SPYING HAS ONE PƯRPOSÊ

 


intelligence operatives trying to recruit government employ¬ees as spies so they can make money and fame by revealing the government’s dirty secrets in headline stories.

Many of your fellow citizens as well as citizens in other countries have been spying on government officials for a long time. For instance:

No one knows how many real estate speculators around the country have tapped into the secret planning meetings of county commissioners, state highway departments, and city and planning commissions.

Any executive officer of any big corporation who isn't col-lecting daily information from a ring of spies working in rhe federal agencies that control and regulate every aspect of his business could be heading down a fast track co failure.

One of the untold secrets of the business of lobbying Congress and state legislatures is char many lobbyists are more interested in intelligence than vote buying. U.S. con-gressmen and senators would be horrified if they knew how many people on their staffs are regularly passing informa¬tion on to people representing businesses and industries that they are targeting for more restrictive regulation.

Employees of the IRS, the Security Exchange Com¬mission. the Patent Office, the Food and Drug Admin¬istration. the Federal Trade Commission, the Office of Safety and Health Administration, and on through the alphabet soup of bureaucracy all have tons of commercial information chat they arc supposed to keep secret. Yet each of those agencies has hundreds of unhappy, angry, in- debt employees who can be recruited to provide such con¬fidential information.

A recent Associated Press report described how (he Cali drug cartel has been spying on top government officials in Colombia. The operation gathered intelligence chat when leaked co the press embarrassed rhe Colombian president and threatened the stability of the government.

14

RVNNTNG A Rise. OF SPIES

 


WHO IS SPYING ON YOU?

Even if you live a life in which you can't imagine that you would ever have to spy on someone else, you may be rhe sub-ject of someone clse's spying. If you are the leader in a com-petitive industry, ever get involved in politics, take a public position on any divisive issue, or have a nice home and posi¬tion in your community and people envy you. you know Something (hat someone else can use against you—if he can ■nd out what it is. It may be a manufacturing technique or process, a special recipe used in a restaurant you own, a guard¬ed list of clients, an idea for a new invention, your credit card Bld PIN numbers, a secret love affair, a past you've overcome. • hit of extra income you don't report on your IRS form, or a *kc that you keep hidden from the world.

If you want to protect your own secrets, you must know how successful spies operate SO that you have some chance at ■putting the person who yon think is a loyal friend, a lover, a ■listed employee, or a harmless, casual acquaintance, but who. in fact, is out to steal your secrets and give them to the Berson who will use them tn do yon rhe most harm.

Protecting yourself from those who would steal your Br< rets is as much a part of a personal defense strategy as arm- Bg yourself and guarding your fence lines.

Before we go any further, a note on semantics is in order. Bi an effort at brevity and clarity, I will use the pronouns kt Bid him as nongender specific, rather than using the more Brkward phrases his or her. This does not mean that

brnales do not make excellent spies and case agents. In fact, Bimc of the most dangerous spies and effective spy masters MVC been female, as the examples throughout this book make abundantly clear.

SPYING HAS ONE PURPOSE

15

 

 


pier Three

The Basic

Principles of Spying

There are several different ways co steal secrets. Among •the most effective of these means are the following three:

Observation and Surveillance: A spy sneaking into the emv camp to count the sick and wounded, or hiding in the •set w hile others talk outside rhe door, is engaging in obser- tion and surveillance. Modern covert surveillance includes mg satellite photography, planting secret microphones, ercepting telephone calls, surreptitiously reading mail, and my other techniques.

The many technical advances in radar, sonar, spy satellites. Ig-distancc and high-altitude photography, high-tech electron-intercepts, laser and parabolic mike audio collection, minia- ized microphones and video cameras, electronic signal inter-ptions, and computer-based deciphering of encrypted mes¬ses arc all designed to improve methods of coven observation id surveillance. Modern national intelligence agencies spend c great majority of their budgets on high-tech surveillance.

Theft and Burglary; This is a frequent plot in spy movies id spy literature. The hero burglarizes an embassy, cracks c safe, lakes picture of the secret documents, and then

17

 


sneaks away with no one the wiser. Despite their popularity with authors of spy stories, burglary and rheft are seldom used in rhe real world of spying. They are t<x> high risk with too lit¬tle chance of success. It was such an attempt at burglary that eventually brought down President Richard Nixon.

The Inside Spy: This means using a human being who has direcr access to valuable secret knowledge to steal that knowl-edge. Some examples are the confidential informant in a drug gang who is under the control of DEA agents, rhe FBI plant driving a group of bombers around town while they plan to blow up the World Trade Center, the Soviet colonel passing on KGB secrets co a CIA contact, the U.S. Marine embassy guard entrapped into spying by a pretty girl he met in a Moscow cafe, or Aldrich (Rick) Ames, rhe CIA officer who made millions passing secrets to the Soviets while he drew his U.S. government paycheck. This is what intelligence officers are talking about when they use rhe word I II'MINT when discussing intelligence collecting activities. (HU.M1NT stands for human intelligence, that is, intelligence collected by a human being rather than by capturing an electronic sig¬nal or taking pictures from a satellite.)

Despite rhe fact that human spies still operate in much the same way they have for the last several hundred years, the spy can often obtain information and intelligence that cannot be discovered by other means. The inside spy not only can gain access to documents and plans locked up in safes, he can provide information on what people arc talking about in pri¬vate, the personality strengths and weaknesses of enemy leaders, internal strife within an enemy organization, and the espionage techniques the enemy is using to steal secrets.

Sometimes rhe human spy can be an incredibly cheap source of intelligence, even though the product is extremely valuable. Such a spy may nor even know that he is providing information to the enemy. That was the case with all those guys on R&R who walked into the Easy Come in Bangkok.

18

RUNNING A RING OF SPIES

 


SPIES CAN IX) MORE

THAN JUST STEAL SECRETS

Once an intelligence officer recruits a spy inside an enemy Ip. he has someone ar his command who is not only able to || secrets but who can also engage in a variety of covert ons that will cause rhe enemy problems. A spy inside an my camp can engage in sabotage and spread rumors and that mislead the enemy and may even destroy the reputa- IS of leaders. The temprarion to use spies for more than lling secrets is a problem every national intelligence agency IS. Every intelligence agency and those who hire the intcl- nce officers must always balance the demand for intelli- ~cc against the demands for using a spy for covert action.

Whereas (his book will focus on the recruitment of Spies th the intention of stealing secrets, anyone can use the [me methods ro recruit a spy who will destroy property, lose les. tell lies, spread rumors, play dirty (ricks thar dcmoral- t the enemy, and engage in other destructive activities, ho. a spy who has been stealing secrets can often be redi- Jcted into sabotage.

SPY RECRUITMENT FACTS

Pick up any catalog of books on espionage and investiga- ion techniques and you will find lots of titles explaining low to search through public records, even more rides escribing surveillance techniques as W'cll as the high-tech ■quipmcnt available for surveillance and how to use it. •There are also lots of books telling a potential spy how to kick locks and open safes. You Can learn how to make bombs •nd dozens of different kinds of gadgets and tools that can be for sabotage, how to tail a Suspect, how to spor someone ■tiling you. and how to use computer encryption programs so ■oil can send messages that no one except the person you end (hem to can read.

THE BASIC PRINCIPLES OF SPYING 19

 


In all those instructions on how 10 spy, you will find almost nothing explaining how to recruit a spy who will report secret information from inside the enemy’s camp.

The secrets of how to recruit spies arc closely guarded by those who have learned how to use them. Such government intelligence agencies as rhe CIA, KGB, British M16. and the Mossad go to incredible efforts ro ensure that their methods of recruiting spies are not exposed to public view. Anyone who works for any of those agencies must sign 3 contract agreeing to never reveal rhe spycrafr secrets learned while working as an intelligence collector.

I'he intelligence agencies of powerful world governments don’t keep these trade secrets to themselves. The secrets of spy recruitment are anything but secret between agencies. The KGB knows everything the C1A knows about rhe differ¬ent ways to recruit a spy. Nothing in this book is going to tell the KGB, Mossad, PLO. Mafia, drug cartels, or even the intel¬ligence services of Such countries as Peru, Bolivia, Cuba, and Uganda anything they don’t already know.

Government intelligence agencies keep their recruiting techniques hidden from the public because they don’t want the general population knowing how they recruit and use spies. Illis secrecy serves TWO purposes. First, it makes it easy for government agencies to recruit ordinary citizens as spies because such people don’t spot the warning signals that they are being recruited. Second, the secrecy helps a government ensure that its citizens don’t start spying on it and finding out just how incompetent, and sometimes criminal, it Can be.

A SPY IS ALWAYS A TRAITOR

A spy steals information from people who trust him and to whom he owes loyalty and then gives or sells that valuable information to thcii enemies. Most people don’t want to become traitors, and, just as important, those who would willingly become traitors are almost never in positions where

20

RUNNING A RING OF SPIES

 


llhey have access lu secret information chat an enemy might |Kint co steal. Therefore, rhe intelligence collector must Irecruit spies who will do his work in such a way that 1) the (recruits don’t realize chat they arc spies, 2) he fools them Unto thinking they are not really doing anything so terrible, lor 3) he traps them in a situation in which they have no Ichoice bur to give the enemy intelligence officer the infor- Imation he demands.

This is rhe primary craft of the intelligence collector who must rely on human resources—the art of convincing people IO commie treason against their country, their employer, their political associates. their friends, and even their loved ones.

Once a citizen understands rhe means of convincing peo¬ple co spy on chose who trust them, he has the tools he can use Ko learn Che secrets of an intrusive government, the big corpo- I ration, the labor union, law firms, a criminal organization, or any other pow-erfnl group that wants to control his life and rake his money and wealth. Just like the armed citizen is the primary defense against both the criminal and an unjust gov¬ernment. so tou is (he citizen who knows and understands the craft of recruiting spies prepared to defend himself againsr rhe criminal as well as a government intent on limiting the free¬doms of its own citizens.

Politicians and bureaucrats don’t want you to learn chc secrets of spying for the same reasons they don’t want you to keep your arms or your right to self-defense, rhe craft of spy¬ing can be as important a weapon in the defense of your free¬dom xs any you can load and lock.

Despite the secrecy under which they are buiicd, chc principles and secrets of spying arc relatively simple to learn and practice. Anyone who wants to discover information someone else is holding can recruit and organize a ring of spies and put them to work ferreting out the icquircd infor¬mation. Il need not be chat expensive: a successful intelli¬gence-collection operation may consist of as few as two or three people.

THE BASIC PRINCIPLES OF SPYINC 21

 

 


Chapter Four

Who Is a Spy and Who Is Not

N

O employees of the CIA, KGB. M16, Mossad, Of

any other international spy agency consider

themselves spies, They will insist that they are

loyal employees of their government, whose job it is to recruit

spies. Often they work in the embassies of their country and

are identified as diplomats or other government employees.

Sometimes they work undercover as businessmen, journalists,

students, or tourists, and sometimes they sneak into (he coun-

try as illegal^ that is, someone pretending co he a national or a

legal resident of the target country.

Regardless of what cover they work under, they not only don’: consider themselves to be spies, they almost always hold in contempt the people they recruit as spies and consider them to be low-life traitors co their own country and culture.

Intelligence officers who recruit and run spies to spy for (hem are called case officers, or case agents. The spy* Of the as he is called in more polite calk, is (he traitor who sells or gives away secrets he has been entrusted to keep safe. This book explains how the case officer does his work and how any ordinary’ citizen can practice the same skills in (he private collection of intelligence. The case officer is the keystone of all HƯMINT intelligence-collection Opera¬

23

 


lions. Evers- ring of spies has a case officer who recruited each spy and who controls and manages rhe activities of each link in the ring.

THE A rrRIBUTES OF A CASE OFFICER

In his book TẨr Craft of Intclỉixpĩưt, .Allen Dulles listed rhe personal attributes of a good case officer as someone who pos- scssess the following characteristics:

is perceptive about people

works with others under difficult conditions

is able to distinguish between fact and fiction

is able to distinguish between the essentials and the non- essentials

possesses inquisitiveness

pays attention to detail

has good oral communication skills

knows when to keep his mouth shut

understands other points of view, and

■ is highly motivated and does not depend on public recognition

Dulles also claimed that he preferred to recruit the good, honest citizen and train him to be an intelligence officer rather than to seek Out people who are naturally devious, con-spiratorial. or wily.

If Dulles actually believed that, it explains why U.S. intel-ligence has so often failed, especially in the recruitment of human resources. “Boy Scouts" who respect and obey the rules of honesty, trustworthiness. loyalty, and friendship don’t do well as case officers, who necessarily have to be devious, conspiratorial, and dishonest.

My experience with U.S. coven intelligence officers who did produce good intelligence by recruiting spies successfully is that they were indeed naturally devious and that they took

24

RL'.NNINC A RIM; OF SPIES

 


to the career they chose like wolves to the hunt. They con-sidered (he ability to deceive (0 be a major part of a game (hey enjoyed playing, and they developed great pride in their abil¬ities to deceive.

DIFFERENT WAYS TO FIND A SPY

The person who wants to recruit and manage a ring of spies has several different types of personalities he might recruit to do the dirty work of spying. Each different type becomes a spy for a variety of different reasons and emotion¬al motivations.

l"hc Inadvertent Spy

Ihcsc are people like all (hose Gls who walked into the Easy C2ome while on R&R in Bangkok. They don't deliberate¬ly become spies, but instead give away secrets without know¬ing what they are doing. ITiey are men and women with loose lips, bad judgment, and careless security attitudes, who talk business with colleagues in bars and restaurants and who brag about their work to their lovers, their friends, and sometimes to perfect strangers. They arc the sources of information that intelligence officers like most of all. They cost little or nothing to cultivate, and they present few risks to the case officer.

For the private citizen who is trying to get information on a competitor, a local government agency, a businessman with whom he is having 3 dispute, or a bad neighbor or personal enemy, the inadvertent spy can often be the only source one needs to cultivate. The trick is to figure out how to get such a person talking about what he knows without letting him guess that he is making a big mistake that may cost dearly.

The Defector as a Spy

Much of (he intelligence information that the United States collected from human resources during the (’old War came from people who lied the Soviet Union or one of rhe

WHO IS A SJ-1 ,vi» WHO IS NOT

25

 


other communist countries. Most were anxious to share any secrets they brought out with them in exchange for new iden¬tities and a chance to live in suburban America. Although most refugees fleeing the communist paiadises had little or no intelligence information, occasionally 3 defector would come from the KGB, the Soviet military, or some important min¬istry. That didn’t happen all that often, however, because though life in rhe Soviet Union was hard and brutal, those who successfully built careers in the government bureaucracy or military command structure enjoyed 3 living standard far above (hat of most citizens.

When defections from the upper ranks did Occur, the intelligence usually had value for a limited time. The Soviet security apparatus, knowing rhat the defector had lied to the West, would immediately initiate a damage-control operation by changing code books, withdrawing case agents and spies rhe defector might know about, and sometimes even moving critical plants and weapons locations.

A good case officer can encourage someone to defect by using many of the Same techniques used ro recruit spies. However, it makes much more sense to recruit a spy than to encourage someone to defect. A spy will continue to provide intelligence for many years: a defector is a One-time intelli¬gence source.

High-ranking Soviet defectors would sometimes contact Western intelligence officers prior to their defection and attempr to make a deal for resettlement in return for intelli¬gence information. When that happened. Western intelli¬gence officers would try to talk the potential defector into remaining in place for a few months or years and serving as a spy. There is no evidence that many potential defectors bought into such a deal.

The .Soviets benefited from very few defectors from (he Western ranks. In most cases in which Western citizens with intel¬ligence information defected, they were long-time spies such as Kim Philby. who fled to avoid capture after being exposed as a spy.

26

RUNNING A RING OF SPIES

 


'Ilic Walk-In Spy

People sometimes walk in and volunteer to spy. That’s what John Walker, a U.S. Navy petty officer working as a [ code clerk, did when he walked into the .Soviet Embassy in Washington. D.C.. carrying with him a collection of stolen Hocuments as evidence of what he could provide. Walker I was motivated purely by a desire to make money, and he : eventually proved to be one of the most valuable spies the KGB ever ran.

CIA agent Rick Ames did rhe same thing, although he didn't have to walk into the Soviet Embassy. His job put him I directly in contact with Soviet intelligence officers, and all he had to do was drop a few hints that he was looking for new sources of income. Ames did his native country even more damage than Walker.

One reason why so few Americans ever defected to the Soviets is that the American who was willing to sell out his country could live very well by staying in place for years, enjoy-ing the advantages all of US in this country enjoy, plus the extra luxuries paid for with the money they earned as traitors.

Despite the fact that walk-ins can be very valuable, most covert intelligence agencies don’t ưusl them. There is always the suspicion that the walk-in might be a plant (that is, a deliberate attempt by rhe enemy to spread disinformation and fake intelligence) or a total fraud—someone trying to sell intelligence he doesn’t have and can’t get.

Everyone knows that (he CIA. KGB. MI6. and every other intelligence agency around the world will pay good money for secret intelligence. A surprising number of people think they can cash in on that by pretending to have access to secrets when they don’t. Sometimes fraudulent walk-ins arc psychotics who believe they are getting secret information from psychic vibrations, foreign spaceships, or a tooth filling that picks up radio waves from distant countries. More often, the frauds are deliberate crooks hoping to make an easy buck. If they also happen to hold real government jobs, they may

WHO is A SPY AND WHO is NOT

27

 


actually collect money for a while before they arc found out.

The stories that such frauds try to sell as intelligence information often follow the headlines. For years after the fall of Vietnam, every U.S. Embassy in Southeast Asia saw a string of people walking in and claiming they had intelligence on U.S. GIs still missing in action. The more clever frauds would tell complicated stories, carry detailed maps, and sometimes even photos of supposed prisoners who were still alive. All of those frauds shared one common thread: they claimed that there was one piece still missing, but that they could find that piece if they only had a bit of money—say, a million dollars or so—to pay off rhe right prison guard. Vietnamese military offi¬cer, local merchant, or other source.

So many walk-ins do indeed prove to be either frauds or persons deliberately attempting to spread disinformation that its easy to understand why intelligence officers have been known to dismiss legitimate walk-ins as frauds.

One of the most productive spies the CIA ever ran inside the Soviet Union W3S Oleg Vladimirovich Penkovsky, 3 highly placed Soviet military officer who was apparently motivated by a political conviction that he was preventing a disastrous world war by passing on secret defense information to the West. Yer rhe first time Penkovsky approached the Americans, the CIA rejected his offer to spy because it was convinced that he was 3 Soviet plant trying to spread disinformation. It was only after British M16 took up Penkovsky’s offer and started verifying what he was providing that the Americans realized they had made 3 serious mistake in not grabbing him the first time he tried to Volunteer. Penkovsky provided a huge amount of infor¬mation for rhe next several years. Eventually the KGB caught on. probably because of their own intelligence penetrations of the CIA and British intelligence, and Penkovsky was arrested, tried, and executed.

Walk-ins don't happen just at the international political level. Just about anyone with a grudge against a commercial company, government agency, or political organization with

28

RUNNING A RING OF SPIES

 


which he works can decide to take revenge by talking to someone willing to pay good money for good information.

The Planted Spy-

One way for an intelligence agency (0 get a spy in the right place is to have someone seek employment with the govern¬ment. business, or agency that the intelligence officer wants to I spy on. This is called insertion, plarement, or gtJrffg

This should not be confused with the illegal case officer, who is a case officer who sneaks into a country with a false identity Ị with the intention of recruiting spies once he is there.

Although it is a popular fiction plot, national spy agencies I almost never attempt to plant one of their own employees I inside a foreign government. The CIA would not, for exam pie. attempt to infiltrate a trained CIA intelligence officer into Cuba with the expectation that he would seek employment with the Cuban Ministry of Defense by using a false identity. The risks of such an operation are too great, and the difficul¬ties of establishing a credible cover arc almost insurmount¬able. Even if rhe effort succeeded, the spy might have to remain in place for years, living a constant lie, before he ever won the promotions necessary to give him access to secrets that would be worth stealing. Also, there is always a chance that as the person stayed in place, he would make friends and eventually grow so close to rhosc with whom he worked that he would refuse to spy, or worse, that he would become a dou¬ble agent.

Such law enforcement agencies as the DEA and the FBI Will sometimes insert a spy into some criminal organization. Although a police officer may go undercover, it will almost always be for a short period of time, generally no more than a few days. Instead, police agencies will usually try to plant a spy inside a criminal organization by making a deal with a criminal they have caught, promising him a lesser sentence if he can produce evidence on a suspected criminal organization by working as a member of rhe gang.

W1IO Is A SPY AND WHO IS NOT

29

 


It is almost always easier to recruit someone who is already in place than it is to insert a spy as a new employee. Anyone intending to engage in a bit of domestic spying should first attempt to recruit a spy in place and should only consider rhe possibility of planting a spy when recruitment efforts have proved to be impractical or impossible.

The Recruited spy

If an intelligence officer can find no one with loose lips nor anyone wants to defect to his side, and he knows that planting a Spy is unlikely to work, then his only option is to recruit someone who is already working for rhe government agency, business, or political organization he wanes ro spy On. Such a person will probably have no intention of spying on those who trust him and would immediately reject an unso¬licited offer thar he spy for money. Therefore, the Case officer will have ro figure out a way to trick, bribe, or blackmail such 3 person into agreeing to become a spy.

The Doubled Spy

The final way to find a spy is to catch someone spying on you. .As we learned in the first chapter, most spies aren’t shot when they are caught; they are doubled. Either they arc used without knowing they are being used—like what happened ro Connie and her girls—or they are forced to cooperate. Those who catch the spy give him a choice of cither being shot, spending a major portion of his life in prison, or working for the people he has been spying on W'hilc pretending to still be loyal to those who recruited him as a spy.

Generally, like in Connie’s case, doubled spies arc used to pass fake intelligence to the enemy, hopefully intelligence that will convince the enemy that one is sưonger, better pre¬pared militarily, and readier TO fight than the enemy previous¬ly estimated. Doubled spies can also provide information On the enemy’s intelligence methods. They can explain how they were recruited, how they made drops, how they were

30

RUNNING A RING OF SPIES

 


handled, who their handlers were. and all the other details of running spies. The spy who is caught, and then doubled, will also have (0 come clean about what damage he has already done. He will have to provide all rhe derails on what kind of intelligence information he passed on co rhe people he was spying for.

This kind of information is so important that even when a spy can’t be doubled, it still pays to get him to talk. That’s why intelligence agencies are always willing to plea bargain when (hey carch one of their own spying for the enemy.

DIFFERENT KINDS OF AGENTS

RECRUITED BY CASE OFFICERS

Depending on the type of intelligence operation he is running, a good ease officer may recruit three different types of agents: primary, access, and support. All of them will he traitors in that they will be working for (he enemy while pre¬tending to remain loyal to their country, employer, political group, or family.

A primary agent is someone who is working in a position in a government, military force, or political group where he has direct access to secret documents, (he conversations of senior officers, or. better still, someone who directly participates in policy-making or operational activities.

A primacy agent can also be a mistress, secretary, driver, messenger, or anyone else who has access to documents, com-munications, and personnel who deal with secret information. The girls at (he Easy Come were working as primary agents for Connie, their case officer.

An aatx agent is a recruit who docs not have any direct access to useful intelligence or any personal relation to such people, bur who may know someone who does. An access agent may also have access to places where potential primary agents work or play. The access agent can then report on peo¬ple who might be recruited as primary’ agents and help

WHO is A SPY ANO W HO is NOT

31

 


arrange for the case officer to make an approach. An access agent may even do some recruiting under the close supervi¬sion of the case officer.

Access agents can also be used lu place hidden micro-phones, cameras, and other technical surveillance devices. For example, a case officer might recruit a janitor working in an embassy and have him plant a microphone in the ambas¬sador’s office while cleaning it out.

A support u^tni is also recruited by a case officer, who will usually have a number of these agents. A support agent per-forms services fur the ease officer such as doing surveillance duty, managing safe houses, clipping news stories, renting cars, making and picking up drops, purchasing supplies, and so on. Often they are openly employed by government intel¬ligence agencies and report (0 work at the case officer’s embassy. Most case officers will employ more support agents than actual spies. The same basic techniques are used for recruiting each kind of agent.

A ring of spies is nor a sports team tn which each player knows how he relates to every other player on the team. In must cases, the spies in a ring of spies won't know who rhe other spies arc. They operate under the security principle of compartmen¬talization. which requires that each player in a spy ring be given only that information rhar he needs to know co do his job.

The reasons for this arc obvious. First, if one spy is iden-tified (compromised), the enemy cannot use him to identify other spies or verify that they exist. Indeed, the best scenario is one in which the captured spy believes he is the only per¬son spying on rhe operation. Second, the case officer can use each one of his spies to verify information collected from his other spies.

An intelligence agency like the CIA can achieve even more effective compartmentalization by using different case officers to recruit and run different spies working within the same target organization.

Sometimes it is necessary to have two or more recruited

32

RUNNING A RING OF Spits

 


spies working together 111 what is usually called a cell. The primary agent might be reporting to an access agent to pass on •he information to the case officer, while also depending on a service agent to develop exposed camera film. The Soviets made very effective use of such a cell structure in the early years of the Cold War. Whittaker Chambers and Alger Hiss were members of one such cell within rhe U.S. Department of State. Many intelligence experts believe that other such cells existed but were never discovered. Because of Soviet com-partmentalization, Chambers had no information on the exis-tence of such cells.

Even though the spies or the cells of spies will not know about each other, the case officer must manage each individ¬ual in the ring so that the work of each spy complements the work of the others.

WHAT THE GOVERNMENT CAN DO.

ANYONE CAN DO

Anyone who knows rhe techniques that case officers working for the CIA. KGB, M16. and Mossad use to recruit spies can use those same techniques to operate an intelli¬gence-collection operation against any business, government agency, political organization, or individual.

First, you must determine what information it is that you must have, who probably has it, and who has access to those who have the information.

.Second, you must determine what the best way of gelling that information is, what it will cost to ger such information, what the chances are of getting caught in the process. and what difference having rhe information might make in success or failure.

Third, you must make a plan for gelling the information and then implement that plan.

Fourth, if you are successful, you musi determine whether or not the stolen information is true.

WHO IS A SPY AND W HO IS NOT

33

 


• Finally, after concluding that the information is valid, you must act on it, even if you must change yuur mind about reality (rhe truth of (he situation, regardless of whether 11 is what you want to hear, or nor).

Just as the Mossad is much smaller than the KGB. the pri¬vate citizen working as a private intelligence officer can down¬size his effort to meet the limitations of his needs, budget, and rime. Just one person may fill all the intelligence functions involved in a lawsuit, a small-business labor problem, a dis¬pute with some local tax or licensing official. 01 an argument with a neighbor over a fence line, neighborhood nuisance, or bit of vandalism.

Even so, the private citizen who sets out to recruit and run a ring of spies still faces the same problem confronting every intelligence case officer: how does he convince someone to turn traitor and start spying on people who trust him?

34

RUNNING A RING OF SPIES

 


Chapter Five

The Making of a Traitor

W

hy would anyone (urn traitor? How does an

intelligence case officer make it happen? There

arc only four basic ways ro get someone to do

what you want them ro do: 1) offer mutual cooperation (0

reach a common goal, 2) suggest a bargained exchange. 3) use

fraud, and 4) use force.

• Mutual cooperation occurs when two or more people want the same thing and agree (0 work together to achieve (hat goal. A whole (own (urns out to fight a fire and save the town. A man and a woman marry and raise children togeth¬er. .A band of revolutionaries risk life, limb, and fortune because they all want a new form of government.

• The bargained exchange is the basis of the free market. Il is how we get strangers to do something we want or give US something we need. We do it by agreeing to give (hem something we have that they want. As Adam Smith point¬ed out, (he baker cares not a whit for my happiness, but he

35

 


supplies me with bread in return for the money T pay him.

Fraud occurs when one person convinces another per¬son to do something with a false promise that he will get something he wants in return. A politician promises the voter good government and low taxes when he inrends to use government for his own enrichment and expeers to raise taxes to make thar possible. A television evan¬gelist promises eternal life and the love of God to all who will send him money, even though he knows he cannot guarantee either. What we call manipulation is almost always fraud. We manipulate Someone into doing our bidding by convincing him that he will get some- reward that we can’t deliver.

With force, we threaten to injure, kill, or physically restrain someone unless he does exactly what we want him (0 do. His life or his money! Pay his taxes or go to jail! Sign the treaty or go to war!

Often, this process of winning cooperation lakes place with little 01 no thought. Two men agree to go fishing and help each other through the day because they both want to catch as many fish as possible, or maybe they just want the pleasure of each other’s company. We walk into the drugstore, pick up a package of razor blades, and take it to the cash reg¬ister to pay for it. We drive the speed limit that is posted and pay our taxes without complaint.

-Sometimes, someone musr fust convince US that it is in our own best interest to participate in a deal by selling US on the benefits we will receive by using a certain kind of soap, giving to a charity; or enlisting to fighr in a war. Salesmanship thus becomes an integral part of the equation. A good sales technique can he merely educational, but most often ir includes a large dose of fraud and manipulation.

The person who wants to recruit a Spy must convince the potential recruit that it is in his own best interest to spy on those who trust him.

36

RUNNING A RING OF SPIES

 


'IÌÌC Spy Who Believes in the Cause

The easiest spy to recruit is one who wants what he thinks I his spying will produce. Julius and Ethyl Rosenberg and Kim I Philby became .Soviet spies because they wanted 3 Socialist I world. and they thought (hat spring for the Soviets was the I best way (0 get it. Soviet citizens sometimes became spies for I the United States because they saw the failures of commu- l nism within their own society and (he human misery it pro- I duced. or they feared that the Soviet leaders were risking a disastrous nuclear war.

Usually, when someone is driven to treason by ideology, I he still loves his country but believes (hat (he country’s lead¬ers have failed the nation and are leading rhe society down ' the road to ruin. Such people rationalize treason by insisting [ that they are not betraying their nation, their birthright, or (heir culture, but instead arc opposing the evil people W’ho have taken control of the government.

Playing on this natural human tendency. U.S. intelligence officers assigned to recruit Soviet agents would never say any-thing negative about Russia, rhe culture, or the people, but would instead try to separate (he Communist Party apparatus from the Russian nation. They acted toward their recruits as though they were nor recruiting traitors, bur rather patriots willing to risk all b> opposing the criminals who had taken control of rhe Motherland.

Spies for Pay

MGivc me rhe secrets I want to know and I’ll make you a rich man.” Many spies do It for the money. This is the easiest motivation to understand and, indeed, to put to use. We don’t like to admit it, but greed drives every human being. Almost everyone has 3 price, and once an intelligence officer knows the price of any individual, the process of recruiting IS reduced ro bargaining the exchange: how much will it cost me for each secret you steal?

Traditionally, inreliigence officers, especially those who

THE MAUNG Ok A TRAIÌOK 37

 


have previously worked with erne believers, have distrusted the spy motivated by greed. A greedy person is often difficult to control and manipulate because his loyalties only extend co rhe next higher offer for his services. Yet in the modern world, money has played an increasingly important role in rhe recruitment of spies. This has been especially true in the recruitment of Americans willing to spy for (he "Communist bloc” countries. Aldrich Ames. John Walker, and FBI agent Richard Miller were all in it for the money.

Once the KGB and its allies learned how easy ic was to buy some .Americans, their recruitment efforts in the last years of the Cold War focused increasingly on those most likely to be enticed by financial reward—young, low-paid personnel such as code clerks, secretaries, and similar government employees, who did not belong to the privileged class of (he Upper-echelon bureaucrat.

Crass spies willing (O (urn traitor for a profit are easy to recruit, once they have been identified. They are often walk- ins. In other cases, a potential recruit may be initially hesitant co turn traitor for money, and the case officer will first have to do a selling job. Like any good salesman, he Will have to psy-chologically manipulate the prospect (0 overcome initial resis-tance co the idea of selling out for money.

WHAT TO DO WHEN YOU CAN T FIND A

TRUE BELIEVER OR A GREEDY BASTARD

Most of the time, an intelligence case officer is not going to find either a true believer or someone anxious to make money who has access to the secrets the case officer wants. Most people believe in rhe cause or the company for which they work. They not only believe in it, they think of them¬selves as the kind of people who cannot be bought, no matter how much money might be offered.

38

RUNNING A RING OF Spits

 


Convincing a Recruit That He Is Doing the Kight Tiling

This means that the case officer will have to use fraud and manipulation in Older to recruit the great majority of spies who have access ro rhe wanted secrets. The case officer must make the potential recruit believe that his own personal inter¬ests will be best served if he becomes a rraitor.

One way to do this is to convince the recruit that the case officer is actually on his side; that is, rhar they both share the same ideals and goals. Another way is to manipulate the recruit into believing that by spying, he will earn rewards chat are rightfully his and, therefore, justify his turning traitor.

To do this the case officer uses the same techniques a good salesman uses to convince someone to buy an insurance policy that doesn’t make good economic sense or a car much too expensive for his budget. In the case of the car, the salesman might first suggest that the customer really deserves such a fancy piece of iron and then manipulate him into concluding that he can handle the payments.

In convincing a potential recruit to spy the case officer, like the car salesman, must play to the target’s emotional needs, greed, and fears, The emotional needs can be based in ideology or personal desires, which can include revenge, anger, idealism, loneliness, or recognition by someone, even an enemy.

Anger

A common emotion that motivates many a person to turn traitor is anger at how his government, employer, or associates have treated him. The potential ưaitor may feci cheated because he has been passed over for promotion, unjustly accused of something, or simply ignored, 'rhe anger may be directed against either an individual, perhaps a supervisor, or the entire system. Other emotions that may inspire someone to turn traitor can range from despair or depression to a sim¬ple desire to be loved and appreciated.

There arc always people who believe that their leaders are

39

THE MAKING OF A TRAITOR

 


misguided and incompetent Of (hat they are unappreciated by bosses and co-workers and have been treated unfairly, causing them to lose their faith in the goals of the organization, but they don’t know what to do next. However, even though the subject may have lots of anger bubbling up inside him. he will probably not be thinking about turning traitor when first approached by a case officer. It is up to the recruiter to figure out how to manipulate that anger or other emotion in a way that will convince the subject that turning traitor is the best way to get his revenge or make the world right again.

Sex

Sexual desire is an emotion on which intelligence case officers often play. Sometimes the potential recruit is deliber-ately bailed with a potential lover. Once love breaks out. the case officer can make it appear that the lover is in serious trou-ble, which can only be resolved if the target turns traitor. This was the case with U.S. Marine Clayton Lonetree, who was a security guard in the Soviet Union in the 1980s and was caught spying for sex, court-martialed, and imprisoned.

Fear

Fear is another powerful force that can be used to manip-ulate people into doing what they don't want to do. Case offi¬cers can blackmail some people into spying. “Do me this favor, and I won't tell that you are a homosexual." Intelligence agencies are especially interested in potential recruits with such secret vices as drug addiction, sexual perversion, a gam¬bling habit, or any past history they would prefer not be exposed. Also, once a person has been recruited by manipu¬lating either his emotions or his greed, the case officer may use blackmail as a means of ensuring that the traitor remains loyal to his new master.

Using Force as Persuasion

People can be forced to spy. It's a technique that law¬

40

RUNNING A RING OF SPIES

 


enforcement agencies use all die lime. They arrest a low-level drug dealer, prosrirutc, bookie, or some other perry criminal, then they threaten to put him in jail for many years unless he agrees (0 spy on more important criminals.

The Gestapo, the KGB. and ocher police intelligence agencies often used the threat uf violence to recruit spies, if not by direct threats ro rhe potential spy rhen his family: "'Remember, you have a wife and a child still living in the old country.”

Criminal organizations in rhe United States and ocher countries also use threats of violence to recruit spies. Often (he threat will be sweetened with some kind of financial reward. It’s what the Mafia calls uan offer you can’t refuse.”

Although such threats do work with criminals and some-times with people who have family living in police states, they seldom succeed in the international spy game or in cases of private spying. You can never predict how someone else will respond co rhe threat of violence, bur many will choose to fight back. They will go to the police ur their security officer. The risks of exposure for threatening violence are simply too great.

rhe smart case officer who needs a spy, and who can't find someone willing to sell out for payment, very probably won’t even consider (he idea of Threatening to commit violence. Instead, he will look for someone he can manipulate into spy¬ing by playing on his emotions co the point where the target slips into spying without realizing what is happening.

REAL LIFE IS ALWAYS COMPLICATED

Most successful recruitments involve a combination of inducements and threats, which play on several different motives that might be driving the person targeted foi recruit* inent. The potential recruit could be a closer homosexual who recently lost a promotion for reasons that had nothing to do with his sexual choices, who is deep in debt, and who just had a long-time lover drop him.

The clever case officer will use each of these emotional distresses to manipulate the target into turning traitor. He

THE MAKING OF A TRAITOR

41

 


might first find a new lover for (he target, have (he lover help build the hate toward the company that refused to promote the target, add a touch of blackmail, and then throw in an offer of easy money to clinch the deal.

LEARNING THROUGH CASE STUDIES

Most government inielligencccollcction agencies use the case-study methodology in training programs for their case officers. Like most of the case studies in this book. the follow-ing case is taken from a real-life situation, but background information and names have been changed for all the usual reasons. The serious student who is trying to learn rhe an and science of Spying should not spend a lol of time attempting tu figure out whether any case study is rhe real Story behind the headlines^ bu( instead should look for what the example teach-es about espionage.

Knowing How tile Game Is Played

Doesn’t Make Someone Immune

'led Brennan joined the CIA right out of college in the early 1960s, convinced that he was taking up a macho career that would be exciting and rewarding at (he same time he helped protect America from the communist conspiracy. Things went well ar first, but over the years he became increasingly disillusioned with (he nitty-gritty deception that makes up the daily grind of the intelligence case officer work¬ing in a foreign country. The promotions didn’t come as fast as he expected, and he had several personality clashes with senior officers whom he considered incompetent dolts anx¬ious to report whatever the national political leadership want¬ed to hear, no matter what the (ruth might be.

rhe job also took a toll on his personal life. His wife, Millie, grew rired of the problems and isolation of living in foreign countries and frequently fought with him over the long hours of unpaid overtime that Ted pur in. Eventually

42

RUNNING A RING OF SPIES

 


rhcy divorced, and Millie rook rhe children back home to Indiana. Ted found himself paying alimony and child support tor three children he almost never saw while his ex-wife went back ro college, 'led was left with no money for (he simple luxuries bachelor men arc Supposed to enjoy. When a mutual¬fund investment he had purchased on (lie advice of a U.S. businessman turned sour, he added to his list of miseries an anger a( (he entire American corporate world.

Then, while on an assignment in Buenos Aires, he met Linda, a Peruvian who was working in Buenos Aires with an international nongovernmental charitable organization. Linda brought some excitement back into Ted’s life, not just on a sexual plane, but intellectually as well. While Ted had gone through college as a jock with little interest in political theo¬ry. Linda introduced him to books on international politics and a world of ideas they discussed with a collection of Argentine and expatriate intellectuals living in Buenos Aires.

Totally disenchanted with his career and anxious to marry Linda. Ted began looking for new employment outside of gov-ernment, He discovered that such opportunities were practi¬cally nonexistent for disenchanted CLA case officer in midca¬reer. Feeling trapped and frustrated by the system. Ted found himself increasingly fascinated with the socialist philosophy that Linda and her friends argued as solutions for everything led saw going wrong with his personal piece of the world.

rhe one thing going right was (hat Linda held a U.S. immi-grant green card and would soon be eligible to apply for U.S. citizenship, a necessary step before Ted could marry her and still keep his security clearance, Three weeks before she was ro take (hat S(cp. it man handed Ted an envelope on a busy street in Buenos Aires, then jumped into a waiting car and sped away, red opened (he envelope to find documentary evidence that Linda, while a student in Peru, had belonged to a Peruvian political group associated with the Sendcro Luminoso Of Shining Path,” the Maoist narcoterrorist insurgency in Peru with deep tics to the coca ưade and a long history of graphic

THF MAKING OF A TRAITOR

43

 


terrorism. The package contained no messages Of any threat of blackmail, but Ted was sure that would soon come.

Ted assumed that whoever had passed on the information intended to blackmail him, probably in an effort CO enlisr him as a spy. Nevertheless, instead of immediately going co his security officer, he told Linda about the package. She admit¬ted that she had belonged to the political organization for a short period of time several years earlier but insisted that she had dropped out once she discovered the connection to the violent Sendero Luminoso.

Although Ted believed Linda’s claims of innocence of any intentional involvement with violent revolutionary activities, he also knew that if the CIA security personnel learned of the information, they would never approve of his marriage to a person with such a history. Indeed, even continuing to date Linda would be a serious breach of security that would cost led his security clearance. Ted also worried that his own security people might have passed him rhe documentation as some kind of rest to see if he would handle the revelations according to regularion.

Linda tearfully announced that the only course of action was for them to immediately stop Seeing each other. She insisted that Ted should go straight to his security officer, report rhe incident, and give the embassy the evidence of Linda’s past political activities. That would save Ted’s career, but the exposure of Linda’s past political indiscretions would cost Linda her job and make her ineligible for U.S. citizen¬ship. Unemployed and unable to travel to the United States, she would have no choice but to return to Peru where she might face charges of sedition by the Peruvian government.

led angrily replied that he would instead resign immedi¬ately. They could then get married as soon as possible and start over in some other Country. Linda pointed out that nei¬ther would have a job or any prospects for finding employ¬ment. Linda would still have to go back to Lima, and it would take months or even years for Ted to find some kind of work

44

RUNNING A RING OK SPIES

 


char would allow him to support Linda in a country other chan the United Scares.

As they discussed rhe problem through the night with time our for a couple of intense sessions of lovemaking, Ted became more and more vociferous in his disdain for his career with the government. He repeatedly insisted char he would do anything to protect their love and keep Linda safe from harm. Near dawn. Linda tearfully proposed one possible solution, provided Ted really was convinced that the CLA was not the protector of freedom that Ted had once thought it to be. Ted agreed imme-diately to meet with ~a friend" that Linda had met through her charity work who “might” be able to help.

Ted knew exactly what he was doing when Linda’s friend turned out to be a known KGB agent working out of die local .Soviet Embassy. The KGB officer cheerfully admitted to Ted that It had been his side that had slipped him the documen¬tation. He assured Ted that CLA security officers knew noth¬ing about Linda’s past and that they would not find out, regardless of what Ted might decide to do. However, if Ted chose to cooperate with the KGB, then Ted and Linda might live a very happy and well-rewarded life, one in which neither would have to keep secrets hidden from the other, as Linda had been forced to do because of her fear that she would lose Ted if he knew about her past.

Already convinced that socialism wxs the hope of the future. Ted compared himself to the German who opposed Hitler and the Nazis but not the German homeland, and he agreed to die KGB man s proposal to make a deal in which Ted would be well paid for information he would pass to the KGB.

led might have gone on to become another Rick Ames, working his way into promotions that would have made him a valuable mole for the Soviets. But Ted’s bad luck held, and for once the CIA’s counterespionage system worked like it was supposed to. A year after he started spying, an alert polygraph technician decided Ted was lying during his regularly sched¬uled polygraph session. At about the same time, one of Ted’s

THE MAKING OF A TRAITOR

45

 


colleagues in Peru successfully recruited a spy inside the Sendero Luminoso, and Linda s name turned up in some of his reporting. CIA security officers put Ted under close sur¬veillance and soon arranged a trip back to the United Stales for what 'led was told would he a training assignment. Once they had Ted and Linda back in the Slates, the CIA counter¬intelligence officers planned to arrest Ted and Linda and charge them with spying.

Two nights before Ted and Linda were scheduled to fly to Washington, neither of them apparently aware that they were under suspicion, a truck slammed into their vehicle while they were driving home from an embassy cocktail party. The driver of the stolen truck fled rhe scene and was never appre¬hended. Linda was killed instantly. Ted survived for three days of interrogation in a drug-fogged, semiconscious slate.

The CIA damage report concluded that Ted had not been spying for the KGB long enough to pass on anything more than tactical intelligence information, rhe same report also concluded that Linda had been working with the KGB from the very beginning, that Ted had been identified by KGB intelligence officers as a potential recruit, and that Linda had been specifically charged with rhe recruitment of led. it’s possible that the KGB somehow learned that Ted was under suspicion and arranged the auto accident to prevent the pub¬lic exposure of Ted as a Soviet spy. perhaps in order to protect a more important mole already working for the Soviets inside the CIA—no doubt the same person who alerted the KGB that CIA security was on to led. It’s also possible chat it was nothing but a drunk driver causing an accident.

Even when he was disenchanted and discouraged about his career in the CIA. Ted Brennan never considered the pos¬sibility of turning traitor until (he night Linda suggested that might be the only way they could stay together. If the KGB had not deliberately set our to recruit him. Ted probably would have eventually quit the CIA and taken up a new career. It’s possible That he might have turned renegade like

46

RUNNING A RING OF SPIES

 


Philip Agee, who also detided chat socialism was rhe hope of (he new world and who wrote Inside the Company: CIA Diary, an expose in which he named numerous CIA officers working in Latin America. Bur it is just as likely thac Ted would have faded into (he night and spent (he rest of his life just as unhappy with 3 career tn business nr the international charily industry as he had been with intelligence.

Long before that night when Linda suggested a way for them to be together. KGB intelligence officers had devel¬oped an elaborate plan that played on the character weak¬nesses they had identified in Ted. Linda had probably been on the KGB payroll as an access agent for years and may have been the person who first identified 'led as a potential recruit. No doubt she received considerable training on how to manipulate a man like Ted, and as she led him from casu¬al friendship ro a serious romance, a KGB case officer close ly monitored her progress.

One might ask why a woman like Linda would agree ro play rhe seducer of a man she neither liked nor respected, even to the point of marrying him and perhaps bearing his chil¬dren. The answer might be found in the general plight of intel¬ligent but poor women bom in any third-world country. The KGB offered a young female university student a way our of poverty, a chance to enjoy an American life-style, and the emo- (ional reward of believing she was on the right side of history. Linda's story 1$ as old as that of Delilah. She may even have eventually convinced herself that she truly loved ’led.

Intelligence case officers consider recruitments like Ted Brennan the epitome of success in rhe intelligence game, especially since such people already know the way the game is played. As Victor Ostrovsky, the ex-Mossad case officer, explained. uThe idea of recruitment is like rolling a rock down a hill . . . you take somebody and get him gradually to do something illegal or immoral. You push him down the hill. We didn't blackmail people. We didn’t have to. Wc manipu¬lated them."

THE MAKING OF A TRAITOR

47

 


Employing techniques like those used on Ted is consid¬ered the best possible way to get a spy in the right place at the right time. Such recruitments allow the intelligence officer to focus on rhe specific agency 01 installation where the best information can be found and then to identify someone already in place who might be approached and recruited.

Recruiting someone who is in the right place at the right lime is is the preferred method of obtaining spies, but in the real world it is not always possible. Indeed, most government security and counterintelligence agencies arc well aware of how spies arc recruited and spend a lot of time and effort edu¬cating people with security clearances about the methods used by other intelligence agencies, as well as watching for hostile recruitment efforts.

On the other hand, the general public is, for the most part, ignorant of the methods used by case agents to recruit spies. Therefore, the citizen who sets out to recruit spies working for a business Competitor, union organization. citizen's political action group, or even government agency that would normally nor be the target of a foreign intelligence effort will find much easier targets.


RUNNING A RING OF SPIES

 


Chapter Six

The Art of Deception

“RỊ Hđy of Deception Thon stiall Do War.”

—Mono of the Mossad

R

ecruiting spies is all about deception. The person

who spies on his country, employer, friend, or lover

engages in 3 constant deception, pretending to be

something he is not—a loyal, honest, trustworthy individual.

The deception doesn't end or even begin with the spy try-

ing to steal secrets. The spy may be as thoroughly deceived

by the person who recruited him as the victim of the spy is

deceived by (he spy.

The spy. the case officer who recruited him. and the case

officer’s employer may be deceived by the intended victim

who 1$ deliberately supplying false information that will lead

the enemy into a deadly trap.

The person who wins the game of spying will be the per-

son who is best ar deceiving others while at the same time

being brutally frank with himself in order to avoid self-

deception. Those who practice self-deception will be the

biggest losers of all.

49

 


ENCOUR AGING SELF-DECEPTION:

THE KEY TO RECRUITING SPIES

Everyone wants to think chat he is a good person, doing whatever it is he does for the noblest of ideals. Some of the most notorious traitors in history—Benedict Arnold. Simon Girry, Vidkuu Quisling, Tokyo Rose, and the Rosenbergs—all thought they were doing noble things. Others, such as the Walker family. Rick Ames, and Richard w. Miller, knew chat what they were doing was treason, but they still deceived themselves into believing that they were not doing such a ter¬rible thing and that their sins were justified by their own cir¬cumstances and the failure of their supervisors and colleagues to recognize and reward their worth.

The professional intelligence case officer or any private citizen who would recruit a spy must understand the human need for self-justification and be ready to offer believable excuses that the recmir can use for self-deception.

The successful case officer understands the human need for love, friendship, self-respect, and honor, and he will feed those needs as he coaxes a potential recruit into turning trai¬tor. He also understands and plays to all the human weak¬nesses— greed, anger, envy, sexual desire, and even rhe fear of God. Like a clever con artist, he will offer to satisfy the human weaknesses while providing rhe self justification that allows rhe recruit to delude himself into believing he is nor giving up self-respect and honor.

A good intelligence case officer is someone who would make a good con artist, the kind of person who can call an old lady on rhe phone and convince her that he is a nice person who wants to be her friend: that she has jusr won a big prize, but that she must first pay rhe “gift tax.” He will have no remorse or pity for (he victim, a person he considers to be a fool, created by God to be cheated.

Most people mnsr be conned into becoming spies. The case officer may have to convince a recruit that he will be spying ro

SO

RUNNING A RING OF SPIES

 


bring about world peace when, in fact, the purloined informa-tion will be used to win a war. Another recruit may be conned into thinking he is giving secrets ro the CIA when they will be going (0 (he KGB.

Those who recruit and manage spies must convince oth¬ers that they are honest, sincere friends who arc only interest¬ed in helping the potential recruit solve some problem in his life or win some unexpected reward.

The case officer who intends (0 recruit and manage spies must practice deception as an an form and a way of life. He must learn to convince others he is something very different from what he really is. He must be able to assume a new iden-tity. spin cates that sound believable, and create an imaginary world that rhe potential recruit will accept as reality.

Learning to tell believable lies is not something that everyone can do. But anyone who wishes to engage in espi-onage must learn (0 tell lies in a way that makes others not only believe them to be true, but to believe them so totally that they Will willingly stake their reputations and even their lives on the perceived truth.

Not all people can pull the same con. A good con always works because it ills (he personalities of the con artist and rhe “mark.” Anyone directing an intelligence-collection operation must recognize the differences in personalities that can he played against each other. A good case officer must not only be good ar deception, he must also be matched to his target and play the role that best fits the larger s expectations of whom he can crust.

Good deception, as practiced by the clever intelligence case officer, must combine the skills of a fiction writer with those of an actor. The crafty deceiver must be able to think up a clever lie and then act out the lie as if it were reality. He must be able to adopt and fit into a culture much different from his native culture and play the role as if it were his real life. This is a skill that must be continually practiced. Intel¬ligence agencies dedicate much of the training of the prospec¬tive case officer to lying.

THE ART OF DECF.FI ICX\*

51

 


How It Works in the Real World

Let’s rake a look at an example of what we mean when wc say that deception is the key to recruiting spies.

Irvin Silverman was a British citizen working as a young bureaucrat in the British Admiralty office that reviewed satel¬lite. signal, and human resource intelligence on the Middle East. Irvin was Jewish, and at one lime during his college days he had seriously considered immigration to Israel. He and his wife. Rachel, often talked about this possibility, perhaps after he retired.

Irvin saw no conflict in his sworn loyalty to the crown and his emotional loyalty to Israel, because British foreign policy was generally favorable to Israel. Even so. Irvin was occasional¬ly troubled when he saw intelligence documents with informa¬tion he thought should be shared with the Israeli Embassy but which carried the restriction that the information could not be shared with any other government.

Several years after starting work for the British govern¬ment, Irvin and Rachel met Haim Hammer while attending a charity dinner to raise funds to support resettlement projects in Israel. Haim Hammer was a likable Israeli businessman about the same age as Irvin and Rachel, and they soon became good friends. Haim would call the Silvermans every lime he visited London. Irvin and Rachel especially enjoyed listening to Haim's descriptions of life in Israel.

One evening Haim complained that while the British gov-ernment talked a good line, the British Foreign Office often took a less friendly stance at the working level and sometimes failed to pass on critical intelligence to the Israeli government. When Irvin asked Haim how 3 businessman could know what the Israeli government was getting. Haim answered that besides his business duties, he was a representative of a pri¬vate group of Jewish citizens spread around the world who helped Jews and Israel in the continued fight for national sur¬vival. He assured the Silvermans that he indeed would know whether or not the Israeli government was seeing any specif¬

52

RUNNING A RING OF SPIES

 


ic piece of intelligence, especially intelligence on Arab terror-ism and Palestinian plans for action. lie then suggested that Irvin might want to put the claim to a challenge by describing some bit of sensitive intelligence so that Haim could deter¬mine whether or not the information had been passed to the Israeli government.

The Silvermans, fascinated with the new information on their friend, had lots of questions, and the three of them talked late into the night about Israeli hopes and the continued com-mitment of many Arab political gioups to the total destruction of the Jewish nation. The more they talked, rhe more Irvin was inclined to accept the challenge to test Haim's claim that much of the intelligence information Irvin saw cross his desk was not being passed on to the Israeli government, apparently because of anti-Jewish sentiment in the British Foreign Office.

Over rhe next several weeks, Irvin picked out several bits of intelligence that crossed his desk and discussed them with Haim. He was horrified when Haim informed him that the Israeli government had not seen a couple of the reports that did indeed contain critical intelligence information

Angry about the duplicity of his own government, neither Irvin nor his wife Rachel even considered the fact that what Haim next proposed would be treason—that Irvin regularly pass copies of secret messages to Haim, who would then pass them on to appropriate officers in rhe Israeli government. Indeed. Irvin and Rachel would have argued that the never named anti-Israeli bureaucrats in the Foreign Office were the ones committing treason by refusing to support what was supposed to be a pro-lsraeli foreign policy.

In the months following Irvins recruitment. Irvin and Rachel would tell each other in their private conversations that Haim’s offer to pay for rhe stolen information had played no role in their decision to help Israel. Even so. the payments quickly built 3 nest egg that made it possible for Rachel to start the next generation of Silvermans. Once the new baby came, they found themselves increasingly depen

THE ARI 01- DtCEi’iro.x

53

 


dent on Haims cash payments for what they had come co consider necessities.

When Rachel expressed concern about what would hap¬pen if Irvin was caught stealing documents, Haim assured them that the Israeli government would help them avoid prosecution. To case Rachels fears, he gave them detailed instruction on how they should go to the Israeli Embassy in London at (he first indication that anyone was suspicious of them. Haim guaranteed that, if necessary, the Israeli govern¬ment would smuggle (he whole family our of England and into Israel where they would be relocated as heroes of the Jewish nation.

.Soon after Irvin entered his fourth year of spying for Israel, he arrived at work (O discover (WO MI5 security officers waiting to interview him about their suspicions that Irvin was making illegal copies of British intelligence documents and passing them on tu a third party. Irvin denied the accusation and then insisted that he wanted to seek legal advice before answering any more questions. The security officers agreed that might be a good idea and scheduled a second meeting for later in the day.

As soon as the counterintelligence officers left his office, Irvin left the building, found a public telephone, and called home. Hysterically, Rachel related chat four uniformed police-men and two men carrying MIS identification had arrived at rheir door carrying search warrants while Irvin was being inter-viewed in his office. Il had been pure luck that (he policemen found nothing in their search. The evening before, Irvin had left a load of materials at a drop sight for later pickup by Haim. Otherwise, the policemen would have found the material that Irvin had been hiding in his home for the past seven'll days.

Convinced that his arrest was imminent, Irvin instructed Rachel to take rheir two-year-old daughter and meer him on the steps of the Israeli Embassy where they would activate rhe escape plan char Haim had laid our for them so many¬months before.

54 RUNNING A RING OF SPIES

 


Smiling ar each other and looking forward ro a new life in Israel, the Silvermans were holding hands and Irvin was carrying the baby as they approached the embassy recep¬tionist and Irvin spoke the code phrase that Haim had given him to memorize.

Irvin and Rachel thus began a tour through hell. The memorized phrase not only broughr no response from the receptionist, the embassy security officer who finally ap¬peared to talk to them insisted that rhe embassy had no record of Irvin performing any service for the Israeli government and then ordered the Silvermans to immediately leave the embassy compound.

Back at their home. Irvin worked rhe telephone while Rachel sal holding the baby, trying not to cry herself as the baby bawled. First. Irvin tried to ger through by telephone to someone at the Israeli Embassy who might be more sympa¬thetic to their plight: then he tried calling the different num¬bers listed on Hammer's business cards as his home and place of business in Israel. In each case the person who answered identified himself as an employee of Mr. Hammer, explained that Mr. Hammer wasn’t in the city and promised ro pass a message to him as soon as possible. Finally, in desperation. Irvin called the emergency number in Jerusalem that Haim had once written down and handed to Irvin along with instructions that Irvin use the number only in the direst of cir¬cumstances. The person who answered on the other end claimed to be 3 refrigerator repairman who knew nothing about what Irvin was talking about. When Irvin tried the other numbers again, no one answered the phones.

Not knowing what else to do, Irvin called a solicitor and went back 10 the office for the scheduled second interview with the counterintelligence officers. Irvin realized for the first time just how much trouble he was in when one of the officers showed Irvin and his solicitor a picture of Haim Hammer and asked if Irvin knew the man in the picture. When Irvin hesi¬tated in answering, the examiner again asked the question, this

55

THE ARI Of DECEPTION

 


time giving the picture a name, Rashid Yasin, and identifying him as a suspected Syrian intelligence agent.

All the years that Irvin thought he was spying for a private Jewish organization supporting Israel, he was instead passing documents to an intelligence case officer working for a Syrian intelligence agency.

The British government, which doesn’t like admitting its failures, opted not to prosecute the Silvermans through rhe conns or make any public accusations. (It probably would have done so if the officers had found rhe secret documents that they had hoped to find at the Silvermans’ home.) However, Irvin was dismissed from government service. Irvin and Rachel did try to immigrate to Israel, but the British had shared the information on what Irvin had probably passed to the Syrians with Israeli intelligence, and an Israeli Embassy employee told Irvin that the Israeli government might decide to prosecute Irvin for ưeason if he ever entered Israel.

The False Flag

The man whom the Silverman’s knew 3S Haim Hammer was a Syrian intelligence case officer who had been using a false flag, one of rhe most important tricks of the intelligence trade used in recruiting spies. Rashid Yasin had been born in Israel but to Arab parents. Recruited as a young man into the Syrian security service, he had spent years perfecting the act that enưapped the Silvermans.

When using 3 false flag in espionage work, the case officer claims to hold a nationality or be a person whom the target for recruitment will expect to be friendly to the target's own inter escs. Every intelligence agency in the world uses false flag decep¬tion in recruiting spies. A Chinese businessman in Singapore thinks he’s working for the Republic of China when he is really spying for Taiwan. A student in Lima thinks he's passing docu¬ments to a man from the Cuban Embassy, who is actually a CIA case officer, who was born and raised in Laredo, Texas.

Occasionally, intelligence case officers do identify them¬

56

Ri INNING A RING OF SPIES

 


selves truthfully to prospective recruits, ’llicre arc lots of peo¬ple around the world who would love to work for rhe Americans and others who would do the same for the Soviets, Cubans, or Israelis. However, even in those situations in which a recruiting officer flics the flag of his true nationality, rhe ini¬tial approach will usually be made by a case officer working under a false identity of some kind. Then, if something goes wrong, the case officer can disappear without a trace.

Although no one collects any statistics on this, the major¬ity of all spies think they arc reporting to a different govern¬ment. political group, or commercial enterprise than the one really reading the information they steal. In most such cases, they would have never agreed to spy for the CIA. KGB, or whoever trapped them into spying. Without the use of the false flag, ven,' little spying would ever get done. The only- spies available for recruitment would be political true believ¬ers and crass traitors willing to sell out to the highest bidder, no matter who that might be.

The false flag serves two purposes. First, as with the case of Inin Silverman, it wins the cooperation of a target who might well prefer death to working for the real spy master who will benefit from his traitorous act. Second, it protects the case offi-cer in the event the target refuses to cooperate and reports the attempt to his superiors or is later caught in the act of spying.

Oftentimes, spies who are captured continue to insist rhat they were working for the organization they thought recruited them long after the false flag has been exposed as a fraud. (The Silvermans still believe that they were spying for Israel and that the claim that Haim was a Syrian spy was 3 Mossad- inspired ruse to hide their activities in Great Britain from rhe British. They considered themselves as Jewish citizens whose reputations and economic futures were sacrificed on the bat-tlefield of intelligence collection.)

Because of the security advantages of working a recruit¬ment under the cover of a fake identity, almost all case officers claim a false identity and carry the credentials to support that

THE ART OE DECEPTION

57

 


identity when they approach an individual with rhe intent of recruiting him as a spy.

Choosing the False Flag

Every attempt (0 recruit a spy is different, depending on the personality of the spy. the organization or person to be spied on. and rhe situation under which the Spy will operate. A key step in every recruitment is deciding what false flag should be used or. indeed, if any false flag is needed at all.

The false flag must be designed to fit the personality of rhe person targeted for recruitment and rhe situation in which the recruitment takes place. The recruiting case officer should represent himself as a person the target will respect, love, or fear.

Sometimes, a false flag character can include all of those things. For example, the recruiting case officer working for a women’s rights activist group approaches 3 devout Catholic-working in a government agency that was targeted by the group. The recruiter pretends to be a priest, perhaps a repre¬sentative of the bishop or a papal agency. The fake priest mighr claim that the church’s interest in the agency is the result of the agency’s active support for international birth-control programs using U.S. funds. In fact, rhe private case officer hopes to gain information that can be used in 3 publicity campsign criticizing Catholic influence on public policy on birth-control issues.

Pretending to be an authority figure, preferably a feared one, often works well. The recruiting officer might claim to be a special agent of the IRS or the stare tax board when approaching the employee of a private company. Another ploy is to claim to be a private investigator or private contractor working for a police or regulatory agency.

On the other hand, if the subject targeted for recruit¬ment is someone who doesn’t like authority, then a case officer might choose the cover of being an investigative reporter out to reveal the secrets the agency is trying to hide from the public.

58

RUNNING A RING OF SPIES

 


One successful entrepreneur who collected corporate intelligence claimed to he the inventor of an arcane technical improvement in telecommunications equipment. He explained to anyone who listened that the invention had made him so rich that he no longer had to work at 3 full-time job. but instead traveled around the world looking for inter¬esting investment opportunities.

The recruiter should not only pick a false identity that will appeal to the personality of the target, but one that will justify some interest in the subject of that intelligence¬collection effort. The homely secretary of a corporate presi¬dent might get suspicious if her brand-new boyfriend, who claimed to be an interior decorator, suddenly Stans asking about 3 construction project in Liberia, but not if he had told her soon after they met that he is 3 civil engineer (as he talks about the bridge he once helped construct in Ecuador).

Remember that the false flag is only one pan of the story. A pretty young blonde who meets an embassy official in Paris rells the lonely man she is employed by a German industrial¬ist to look for foreign investment opportunities. As she and the embassy official become lovers, he never suspects that she is really working for the KGB. Yet both the tale of her search for investment opportunities and the lovemaking were part of a carefully thought-out plan designed to recruit the diplomat as a spy.

Deception can even be beneficial when an attempt to recruit a spy fails. If the target goes straight to his security offi¬cer to report an attempt at recruiting him to be a spy, he will also carry the tale of the false flag and thus divert attention away from the true identity and intentions of the case officer.

For example, an intelligence officer working for a private business approaches a prospective recruit and claims to be working for the IRS, which would pay a large reward for cer¬tain information about the recruit’s employer. Instead, the honest employee tells the boss about the attempt. As a result, the target may no longer be such a strong competitor because

THE ART OF DECEPTION

59

 


he’s worried too much about an IRS investigation into his financial affairs.

THREE STEPS TO TELLING

BELIEVABLE LIES

Everyone lies. It is the most human of all human traits. But some people lie better than others, and the person who recruits spies had better be the best. There are three steps to telling believable lies.

1) Create a well-rhought-out story. 2) Set up rhe necessary props to make the story appear true. 3) Step on the stage and perform the part so well rhat those listening want to believe the story is true.

Creating a Good Story

Professional case officers call a cover story rhe legend. Like all good stories, a legend must have several elements.

1) It must contain a lot of truth. Rashid Yasin/Haim Hammer knew everything there was to know about the operations of various international Jewish .groups. He knew how they oper¬ated, and he knew that they often recruited Jews in place, including such publicized instances as the Jonathan J. Pollard case in the United States, in which a Jewish organization did indeed recruit an American Jew, who then stole and passed on a collection of intelligence documents.

Keep the lying part of the story to rhe absolute minimum necessary to achieve rhe deception. Don’t add unnecessary detail that will be difficult to remember and don’t elaborate when not required. When someone introduces himself as a doctor at a cocktail party, he doesn’t list his qualifications, education, and experience. Indeed, he may be extremely reluctant to talk about his specialty, having too often been approached by strangers who want a little free medical advice.

Nevertheless, rhe liar must be ready to add additional details if questioned by someone who is curious, or maybe

60

RUNNING A RING OF SPIES

 


naturally suspicious. When challenged, (he trained liar keeps the answers to such challenges as short and to rhe point as possible. Rather than talking about himself, he asks questions and tries to get others to talk about themselves, their experi¬ences. and their thoughts. The con artist gives rhe impression of listening sympathetically.

2) The liar must be familiar K7/4 the background supporting the story. He shouldn’t prerend ro be a brain surgeon if he doesn’t know the difference between 3 hemostat and hemoglobin. Rashid Yasin knew as much about Israel as any sabru (a Jew bom in Israel) horn and raised near Jerusalem. He also was thoroughly familiar with Jewish religious practices, and he had practiced his deception in dozens of different synagogues in England. When he talked about life in Israel, he sprinkled his conversations with details of streets, stores, markets, cheaters, and holy spots rhar any resident of Israel would recognize. He dropped names of politicians and movie stars and talked about family days cele- hraring the Feast of rhe Passover.

3) The story must give the target some reason to zrant to ỈLưen and believe. The lie might appeal TO the target's prejudices or his curiosity, offer solutions to his fears and personal problems or suggest the possibility of profit.

4) The lies in the story must be both internally and externally consistent and Kell thought out. The teller can't talk at one point □hour an old car he owns and then later mention the new Ford he drives. In (he same way, he should check weather records before talking about getting caught in rhe rain on rhe second Saturday lasr May.

5) Good lies take advantage of recent events. When mobs raid¬ed rhe U.S. Embassy in Taipei, Taiwan, (he Soviets soon (here after released several documents through front organizations that claimed to be U.S. secret communications stolen by (he mob. Those documents discussed the U.S. government s inten¬tion to abandon Chiang Kai-shek, a total prevarication.

When running a deception, a case officer must plan for every possible reaction by the target. He muse know exactly

THE ART OF DECEPTION

61

 


what he will do no matter how the target reacts. He identifies rhe worst possible case scenario, then plans out 3 response for evey objection, question, or doubt that the target might raise. Once he has the details planned out, he goes over them numer¬ous times before meeting with the target- The better he knows the part he will play, the less likely he will make a mistake.

Ar rhe same time, a deceiver must not get so committed to a story that he can not rake advantage of new developments or incidents. A good deception plan anticipates almost every chaotic event that might happen. A good lie always starts with a prepared script, but unlike the stage, the liar must be pre¬pared to rewrite the script at each point in the telling.

Setting Up the Props

Every actor needs costumes, background scenery, props, and people who will support his role. It’s true that a good actor can sound almost believable just by rhe way he reads a script, bur in espionage, almost is never good enough. The basic props that every case officer needs include such things as doc¬uments that support various identities; lented offices with computers, faxes, and phones that will be answered as if they were in a legitimate business office: rhe right kind of car to go with the story: and the clothes, luggage, briefcases, and per¬sonal items that fir the character being played.

The documentation that supports rhe fake identity can be as complex as a passport, a Social Security card, a drivers license, credit cards, and a complete set of supporting papers such as graduation degrees and professional licenses. In other situations it need not be anything more elaborate than a few business cards and a wallet with a couple of fake ID cards.

There are a number of books on the market detailing the intricacies of false identities, and the would-be case officer should familiarize himself with the literature and then do whatever is necessary to build a collection of identities that fir the personality of the case officer and will stand up to exami-nation. A commercial printer can prinr a collection of business

62

RUNNING A RING OF SPIES

 


cards, stationery, envelopes. and invoices with any logo and name the customer requests. Computers with scanners and color printers make it child’s play to copy or produce letter¬heads. company ID cards, club memberships, business licens¬ee. union cards, and just about any other document that will pass cursory inspection.

The person who sets our to recruit a spy in the local union will nor need the same kinds of documents that a case officer attempting to cross a border with a fake passport would need. For most private intelligence officers, a good computer and a color printer should Suffice for producing all rhe documenta¬tion needed ro convince a target chat a person is really what he claims to be.

Americans generally accept people for what they say they are. provided they look the part and speak the lan¬guage. The only time anyone shows identification is when he writes a cheek, uses a credit card, or is stopped by a traf¬fic cop. Even when someone Hashes rhe credentials of a police officer, a health inspector, or an IRS agent, the target of the investigation seldom takes rhe rime co examine the badge and (he ID card closely. Documents that will pass such scrutiny are easily faked and will do the job for must intelligence-recruitment activities.

The background scenery’ and the support actors should be as well-prepared as the costume and the props. Rashid Yasin/Haim Hammer didn’t just carry a fake Israeli passport and a driver’s license listing an address in Jerusalem: if some¬one had called at the address, a woman claiming to be rhe maid left in charge of rhe house while Mr. Hammer traveled in England would have opened (he door. A call to one of rhe tele¬phone numbers listed on Hammer’s business card was answered by an office secretary anxious to help out a possible customer. There was even a propman ready to pull the curtain closed: the refrigerator repairman on (he other end of the emergency number knew as soon as Silverman identified him¬self that something had gone seriously wrong. He immediate¬

THL ART or DECEPTION

63

 


ly notified Rashid Yasin and his supporting cast that the oper-ation had been blown and that they should all disappear.

Performing the Part

The an of deception is so important to successful espi¬onage that anyone who intends to recruit Spies must study and practice deception with the same dedication that an actor demonstrates in his chosen profession. Indeed, I’ve known several very successful case officers who took part in amateur drama productions so that they could get practice in playing a role with conviction. One of the reasons why Rick Ames may have avoided detection for so long, even passing CIA poly¬graph exams, is that he studied drama in college and even considered a career as an actor before joining the CIA,

All actors arc liars. They are not really in love with the woman; they don’t really want to kill rhe other guy; they are not real cops or robbers. In the same way, all successful liars are good actors. If they claim to be cops, they act and talk like cops would act. The acting is often even more important to a good lie than rhe other props.

The case officer is always on the stage when he meets with any recmit or potential recruit. As with any actor, the case officer may be playing more than one role as he moves from meeting one recruit to another. He must be able to switch roles with the case he changes shirts. He Can never allow a recruit to catch him out of character, in spite of the fact that he may be ninning an entire ring of spies, and each spy knows him as a difierent person.

64

RUNNING A RING OF SPIES

 


Chapter Seven

Exercises in Deception and Intelligence Collection

N

O actor memorizes his lines and (hen speaks them

on the stage for the first time on the night the

play opens. Just like the actor rehearses on stage

while rhere is no audience in the theater to boo him. the per-

son who intends (0 commit serious deception must first prac-

tice in situations in which there are no personal risks.

However, unlike the actor who rehearses with other actors,

the person who wants to recruit spies should practice his

deceptive skills in the real world with real people.

The goal of the exercises described below is to learn how¬to approach a perfect stranger. introduce yourself with a plausi¬ble explanation for why you want to meet him. present yourself as someone the stranger would want co know better, and then set the scene so that you meet the stranger in a situation in which you have control. It must all be done while you pretend ro be an entirely different character than who you really arc.

To practice doing this, approach strangers in such places as hotel lobbies, restaurants, bars, airports, churches, meeting rooms. libraries, grocery scores, roadside rest areas, and any other public places. Initiate a conversation or set a scene where the stranger initiates a conversation and then cell the stranger a story that he believes to be true, rhe ultimate goal

65

 


of the exercise is to present yourself W'irh a believable false identity and then ro use that identity in a way (hat gets the subject to reveal something personal, to perform some service for you. or tn agree to a second meeting. At the end of the exercise, the stranger should be convinced that he has just met someone who is interesting, honest, and Worth getting to know better.

PRACTICING DECEPTION

IN LOW-RISK SITUATIONS

Finding unsuspecting people to practice deception on is an easy task in our society. Most Americans talk to strangers every day, provided they appear to be honest citizens going about their legitimate business or engaging in a popular recre¬ation. We talk ro the guy and the gal standing beside US at a bus stop, the person sirring next to US on a plane, rhe lady waiting on us in a store, people sitting around US at a football game, parrons in the bar where we drink, skiers standing in line ar the lift, and in hundreds of other situations. Such con¬versations may start with some inane comment on the weath¬er but often result in a lot of information being exchanged, especially if one parly deliberately leads the conversation in that direction.

Engaging in 3 harmless deception with a stranger makes it easier from a psychological point of view because you don’t have to worry about being found out and then charged with a crime, if a stranger you meet on an airplane accuses you of lying when you tell him you arc a writer from some tabloid sold at the checkout stand in grocery stores, it COSTS you noth¬ing in grief. All you have to do is stop the conversation and think a bit about what made him suspect you were lying.

Don’t worry about taking up a stranger’s time. Most peo¬ple live deadly dull lives, and they arc usually enthralled when given a chance to experience a vicarious adventure. They will love your talc of how you spent 10 years as a mis¬

M

RUNNING A RING OF SPIES

 


sionary in the Amazon, how you narrowly escaped being con-victed of murder, or how much you expect to earn from the sale of your first novel.

Travel Opportunities

When traveling on a plane, train, or bus, board with sev¬eral different versions of who y ou are and what you do for a living or a good time. The stories should he worked out in detail, and you should have answers for any questions the tar¬get might ask. Indeed, it is 3 good idea to write down the details of each cover story. Stories might include a claim that you arc employed in the movie industry, perhaps as a makeup artist or an assistant to a famous director: that you arc a crimi¬nal-defense attorney with a long history of getting people off on technicalities; an investor who has made a fortune in a cou¬ple of stock deals, and you now spend your time traveling around looking for deserving people to help; a private detec¬tive searching for evidence to clear a young woman falsely accused of murder; or a U.S. diplomat on leave after an assign¬ment in some country that has been in the news.

Once you have your stories ready, pick a different one each time you start a new conversation with a new person and tell it as if ir were the truth. Start each conversation by asking your seatmatc (he usual polite queries about his destination, why he is going, etc. If possible, get the other person to talk about himself. That’s usually easy to do. Talk about yourself (your legend) only when asked, and then somewhat reluc¬tantly. The more the person talks, the more you will learn about him.

When you do talk about yourself, tailor your story to what you have already learned about the other person. If your scat-mate is a pretty, young, serious woman who is a business major at a small university, you might say that you work for a famous movie director. This could lead to questions about whether she has ever taken drama lessons or appeared in any plays. Ask for a name and an address where you might contact her for a

EXERCISES

67

 


possible screen rest for a movie you will soon be working on in which (he director is looking for new. natural faces.

If your scarmate works for a large international corporation, tell the diplomat-on-Ieavc Story. Talk about 3 number of busi-ness opportunities in the country of your assignment, which no American seems interested in.

If the scatmate turns out to be a religious minister, des¬cribe your experiences as a defense attorney who Successfully defends criminals you know arc guilty and often commit terri¬ble crimes afterward. Pretend to be disillusioned and looking for a way to change your life. Throw in a few comments that suggest you've had some major personal problems too—per¬haps marital strife or a teenager who has run away from home.

If you are talking to a middle-aged school teacher, pull the detective story, molding it into something that would appeal to the teacher, perhaps that you are trying to clear a high school principal accused of molesting a teenaged hoy or to track down a school teacher who travels during the summer as a secret serial killer. If you use this last scenario, try to build the story so that you might use someone like the target as a source. This means you will have to place rhe investigation somewhere near where your seatmarc lives and build it into something that might touch his life. Invent evidence that sug¬gests that the killer might be teaching in a school in his area or that the teenaged boy once went to a nearby school. .Ask advice on how you might find out what teachers do during summer vacation. Sec if you can get the target to agree to do some investigation for you—for good payment, of course.

Other possible identities could include a stock trader if you meet a small businessman; a father searching for a lost child taken by the mother 12 years ago, if you meet some grandmotherly type: a world traveler who’s lived abroad for many years, including time spent in a Thai jail for drug traf-ficking, if you sit next to a college srudent.

Whatever the cover, the goal should be to get the target interested in what you are doing SO that he might agree to

68

RUNNING A RING OF SPIES

 


help if you asked. You want the target to willingly give you his name, address, and a Telephone number where you could con-tact him for a follow-up. The stranger may ask for rhe same information from you: give him a false name, address, and phone number. Ir works even better if you carry’ several sets of business cards supporting each of the false identities you intend to use.

However the conversation goes, as soon you are alone, sit down and write out all the details of how the deception played out and everything you learned about the target of rhe deception. Make special note of what went right and what went wrong.

I .ying in Church

Go to church in a nearby city where no one knows you. Be friendly and polite to those sitting near you, but sort of shy. Sooner or later, the minister or someone in the congregation will want to talk. Explain how you haven’t been in church for many years, but that you had a recent religious experience that made you question your previous agnostic beliefs and sent you looking for answers. Don’t volunteer it, bur have a detailed story you can relate if asked, perhaps the death of a child, a serious illness, or an experience as a victim ofcrime or a survivor of some natural disaster. Don’t make the experi¬ence something miraculous; it should be more psychological in nature. ?\s you talk to various people in the congregation, learn as much as you can about them: where they work, how happy they seem to be with their lives, what different social cliques exist within the congregation, and so on.

I low many invitations to social functions, group meetings, or private discussion groups did you get? Whom might you approach if you were an insurance salesman, a man looking for romance, or someone looking for 3 source to recruit in the local city government? Look for individual quirks and poten¬tial character weaknesses that might be exploited should you decide to recruit someone as a spy.

EXERCISES

69

 


Looking for Business Information

Go to a business office located HI a building chat overlooks a busy intersection. Tell (he secretary (hat you arc an insur¬ance investigator looking for someone who might have seen a fender-bender that occurred several weeks earlier. Mention the possibility of a reward that will be paid to anyone who pro¬vides information leading to 3 witness. Give as few details about the accident as possible in your initial query. It’s proba¬ble someone will have witnessed some kind of accident dur¬ing the previous several weeks. If that person gives the details first, you can pretend that whar he saw is the accident that you are investigating. Get as much personal information as possi¬ble on the people to whom you talk.

If you find someone who is especially interested in the possibility of earning a witness fee, change stories, claiming that you arc really- investigating the high rate of workman's compensation claims filed by the company and suggest that if (he target can provide that kind of information, he might make even more money.

ADVANCED DECEPTION TRAINING

The person who intends to engage in any serious cspi onage activity, regardless of the target, will want additional training in deception before actually beginning an intelligence operation. These advanced techniques arc not innocent fun. as the practice situations above suggested. Even when they do not cross the line of legality, they invite retaliation should the targer be able to identify the tormentor. The wise person who uses practice exercises similar to (hose described below will travel to a distant city where no one knows him, use public¬phones. and make any long-distance Calls by charging the cost to one of the phone credit cards that can be purchased from machines in supermarkets and similar places. He will be train¬ing not just in deception bur in security as well.

Because these practice deceptions require raking some

70

RUNNING A RING OF SPIES

 


legal risks, (hey should not be engaged in by anyone who docs nor intend to take up spy recruitment 3$ a profession or a per-sona] necessity.

Some of these advanced training exercises require some supporting false documentation. How much ID is needed and how good it must be depends on the level of deception and the sophistication of the person being deceived. The follow¬ing exercises assume that you will be carrying whatever docu-mentation might be necessary to back up the deception.

Get Politically Active

Call on the manager of a local political campaign—the more important the office, the better. Using a false identity, claim to be a wealthy volunteer with lots of time on your hands and a sudden interest in politics. Drop hints that there might be quite a bit of money available—if (he campaign manager can suggest ways to put the money into the cam¬paign fund without violating federal election campaign laws. Put in several days of work at the headquarters, meeting as many other campaign workers as possible and perhaps even the candidate. The goal is tu learn as much information about the candidate’s behavior as you can while working with the campaign.

(Jail a Newsman

Contact a newspaper reporter and claim to be a midlcvcl government official who has information on a major corrup¬tion scheme. (Use the current political situation to come up with a scenario that will make the reporter think he may have the next potential “Deep Throat” on rhe hook.) Describe the story in detail, providing “evidence” to convince your listen¬er. Suggest a secret meeting in which he will control the secu¬rity scene. Ask how much the newspaper reporter will pay for the full package of evidence you have.

EXERCISES

71

 


A I lotel Visit

Check into a hotel with 3 fake identity, pay cash, and talk to as many people as possible in the lobby, at the desk, in the dining room, everywhere you can. Tell them all the same tall tale—say, for example, that you are visiting the United States on your first vacation in several years after working for 3 long while as a missionary in a foreign country. During the stay, find out if arrangements can be made with any of the hotel staff for a prostitute to come to your room and how much it will cost. If it's nor too expensive, order one, and when she appears, pay her fee (you don't have to actually have sex, unless you want to). Then try to get the prostitute to agree to spy on an important businessman or politician who lives in that city for you.

Using rhe phone in the hotel room, pick several different businesses, professionals, and government agencies from the yellow pages and call them. With the businesses, pretend to be a customer with a potential big order. With rhe profession¬als, try to find out if lawyers will quote fees over the phone, how' easy it is to make an emergency appointment with a doctor, or how much free advice you can ger by telling a good story. If you arc a serious student of deception, you might pre¬tend to he an IRS special agent initiating an investigation of the professional you arc calling, or a policeman checking on recent patients who have been treated for a specific kind of injury (“We know the assailant suffered such an injury while attempting to commit rape”). When calling a government agency, report that the business you work for might be in violation of what¬ever laws and regulations that particular agency enforces; you might also pretend to be a salesman trying to ger an appoint¬ment with the purchasing agent or a customer asking for a tax identification number in order to file 1099s with rhe IRS.

Getting into a Stranger's Apartment

Gain entry into a large apartment building by pretending to be a package-delivery service. Carrying a real package.

72

RUNNING A KING OK SPIES

 


invent a story that will convince a suspicious apartment dweller you are delivering a delivery from an unknown per¬son. Possibilities include flowers sent anonymously or a pack¬age containing a small, inexpensive appliance along with a let¬ter on business letterhead explaining that the addressee has been chosen ar random for a promotional scheme. (If queried, the deliveryman can explain that be has delivered several such packages around rhe city.) Whatever the story, you must leave behind someone who believes that he has received a legitimate delivery and will have no reason to call the police or building security officer.

Once inside the building, figure out a way to gain entry into another apartment on a different floor. The cover story must pro¬vide you a legitimate reason to be in die building and to request help from someone else inside the building. Cover stories might include a claim that you arc a private detective investigating an insurance claim and looking for possible witnesses, a mainte¬nance worker trying to find our who has a certain kind of plumb¬ing or heating problem, or someone who just accidentally- dropped a small horde of wine or soda pop and who would like to clean up the mess before leaving the building.

Gaining Entry to a Private Home

Pick a private home in a middle-class neighborhood and attempt to gain admittance. You might pretend to have car trouble and ask co use rhe phone. In this scenario, you should have a friend standing by a phone in case the homeowner docs rhe smart thing and leaves you outside while he calls (he emergency number you provide. Your accomplice will answer the phone by identifying the number as the Ace Tow Service and (hen ask (he expected questions about the address.

Other introductions that mighr help you (0 be admitted into a strangers house arc pretending to be a missionary (remember to carry a Bible and a briefcase full of religious (facts), a federal investigator doing a security clearance on someone who once lived in the neighborhood, a political

EXERCISES

73

 


worker crying to ger out the vorc, Someone collecting for a charity, or a person who once lived in the house as a child and wants (0 indulge in a bit of nostalgia. The more original the legend, and the better rhe legend fits the probable prejudices of the homeowner, the better your chance of getting in. Once in. learn as much about the family as you can from your observations and the casual conversations that follow.

All of the above exercises arc only suggestions. Each per¬son wishing to practice the art of deception should chink up a series of exercises to maximize his strong points. The goal is to get comfortable in the an of lying while in low-risk Situations and then move a step at a time into higher-risk situations until you are ready to use your deception capabilities co full advan¬tage co recruit others to steal valuable information for you.

74

RUNNING A RING OF SPIES

 


Chapter Eight

It’s More

Than Telling Lies

D

eception is not enough when it comes to recruit-

ing and managing a spy. The good case officer

must be a student of psychology, who under-

stands the human psyche and has the ability to interpret the

emotions of another individual and respond to them with

apparent sympathy.

BE THE BEST NEW

FRIEND THE TARGET HAS

When victims of con men are interviewed by a police offi-cer they always say something like, "He was such a nice man.” Successful con artists and intelligence case officers must learn to act like nice people. They pretend to be sin¬cerely interested in their target, they almost never get angry, and when they do. it's a cold-blooded, well-thought-out action designed to produce a specific behavioral response from the recruit. They ask lots of personal questions (including a few

75

 


the recruit can answer with a bit of bragging), are sympathet¬ic (never judgmental), and always willing to listen.

A good case officer will use every personal advantage he brings to the contest. People with the physical advantages of youth and good looks will use their sexual attractiveness as an intelligence tool in a manipulation that is as old as the story of Samson and Delilah. An older, educated person will play on the tendency of most people to respect both age and learning. A self-confident, military-style personality will use his charis¬matic ability to command obedience.

The most effective false flag of all is a beautiful woman or a handsome man who has “fallen madly in love” with the potential recmir. As with the girls of the Easy Come, such a recruiter can often learn the secrets of the recruit without the recruit ever knowing he has become a spy.

Tn rhe same way, someone looking like the wise old man may remind the target of an old grandfather. A person who looks like a TV lawyer can offer help and advice, and rhe motherly woman can win rhe trust of the young lady who wor¬ries about her rwo-ycar-olds tantrums or her teenagers fasci¬nation with drugs.

PERFECTING THE ART OF CONVERSATION

The intelligence case officer must understand how to ger people ro talk while he listens. This skill is especially impor¬tant when using people as inadvertent spies, but it is also a critical skill in the process of recruiting those who will even¬tually spy knowingly for rhe case officer. The more the other person calks during any conversation, the more anyone trying to gather information will learn and rhe less likely it is that the target will learn something that the intelligence collector doesn’t want him to know. (A good case officer will never allow the target to learn anything about his true personality, real hopes, fears, or despairs, except when such information fits the false flag he is flying.)

76

RUNNING A RING OF SPIES

 


Getting people to talk is much easier than most people realize. Almost everyone would rather talk than listen. Because of that human trait, most social conversations are games in which each side tries tn maximize the percentage of time in which he or she does the talking. Few people really listen to what other people arc saying. They are instead think¬ing ahead to what they will say when they next get a chance to lake control of the conversation.

.As a result, most people arc hungry for someone who will listen to them. Both con artists and good intelligence officers know this, and they deliberately feed that hunger. They not only listen, bur pay rapt attention and ask questions that encourage the target to keep talking. The best intelligence officer is one who makes rhe target believe that both of them arc important, smart, experienced, and clever, and that the target has something to say that is worth listening to.

Most people so enjoy an intelligent, attentive listener, that they will do everything possible to keep the conversation going. Time and again. I’ve gotten people to tell me valuable intelligence information by paying them the compliment of listening to every word (hey say, even when what they arc say-ing is of no interest to me. Even though they may start out with the intention of keeping certain secrets to themselves, as they glory in rhe experience of having 3 listener hang on every word, they will start letting slip more and more information in an effort to get the listener to continue to listen to them. People will literally give you their secrets in exchange for con¬tinuing to listen to them talk.

I can't count rhe rimes I’ve been in long meetings in which I listened intently as my intelligence source talked about his family, personal experiences, theory of warfare, or political beliefs. Although I learned nothing new, I listened with rapt attention, with my only responses being questions or murmured agreements to demonstrate that I was listening and (hat Ỉ shared his conclusions. Then, when I finally start¬ed to apologize for taking so much of the important man's

I rs MORE THAN TELLING LIES

77

 


time and suggested it was time for me to go, lie would insist that 1 stay a little longer. When I reluctantly settled back in my chair, he would launch into another monologue in which he did start telling me the secret information I had hoped co ger out of him.

One time in Vietnam when I was working as a U.S. civil¬ian official, I interviewed an ARVN (Army of the Republic of Vietnam) lieutenant general on how the war was going in his sector. After spending more than two hours listening to him discuss his theories on the best way to fight the Maoist insur-gency—theories that were in total disagreement with those of his U.S. military advisors—1 apologized for taking so much of his valuable time and started to stand up to say good-bye. Apparently. I was rhe first American who had ever taken the rime to listen to him without trying to shout him down. He reached a hand out, grabbed my wrist, and pulled me back down to my chair. Then he launched into a long description of a secret cadre assassination program that he and his men were implementing without informing his U.S. military advi¬sors. but which he claimed was decimating the Victcong cadre in the area.

As he described the program, what most fascinated me was the reaction of his staff who had sat silently through the long meeting, but who were suddenly horrified to hear their general let an American in on their dirty secrets. One captain, the brightest young officer in rhe group, managed co catch the general's eye to give him one of those glances that attempted to remind the general that he should perhaps be a bir more discreet. The poor captain got back an imperial glare that not only put him in his place, but warned him thar he might soon be back in the jungles patrolling for Vietcong ambushes.

What's funny is that when I reported back to my superiors what I had learned, I was told that the general had been feed¬ing me a bunch of lies because what he was telling me was contradicted by the intelligence collected by both army intel-ligence and CIA case officers. It was only three or four months

78

RUNNING A RING OF SPIES

 


later that the intelligence experts learned from their well-paid spies what 1 had learned from the general by paying him noth¬ing more rhan a few compliments. By then, rhe ARVN gener¬al had been transferred to a dead-end job in Saigon at the instigation of a "ring knocker" (a West Point graduate) advi¬sor who complained to the U.S. command structure that the general was not following U.S. advice on how to fight the war.

THE RULES OF FRIENDLY INTERROGATION

1. Never criticize the other person’s religion, country, family, intelligence, education, or personal conduct. If he criti¬cizes himself in any of those areas, be sympathetic to his concerns and confessions, but don’t agree with too much enthusiasm.

2. If you disagree with something the other person says and conclude that you must make that point to keep your own credibility, ask questions that give him an opportunity to better explain his beliefs while letting him understand there may be a difference of opinion. Let him know by the way you ask the question that, although you may have doubts about his conclusions, you respect his opinion and want to understand why he believes as he does. Never attempt to use logic to argue him into admitting he was wrong.

3. Answer the other person’s questions quickly, simply, and directly. Don't add details and don’t anticipate or answer questions he doesn’t ask. You want to get back to Icrnng him do the talking as soon as possible.

4. Always follow his question with a question of your own that gets him talking again.

5. If you must interrupt rhe other person, do so only to ask a question that further expands w hat he is saying on a sub¬ject that interests you.

6. Don’t hurry to reach the point of your interview. If possible, let him bring up the subject in which you arc most interest¬ed. Learn to lead the conversation by suggestion and casual

IT’S MOKE THAN TEIXING LIES

79

 


references. ĩf you do ask direct questions and he seems reluctant to answer, slip into another subject and pretend you really weren’t that interested in the matter. Lead him back ro the subject after you've softened him up a bit more.

7. Let him fill the silences. A silent break in the conversa¬tion makes most people nervous, and they feel compelled to fill ir. Use that to your advantage. If the other person doesn’t respond immediately to some statement or ques¬tion, wait him our. If you don’t really want to respond to a question he has asked, think about it a moment. He may¬start talking again to fill the silence.

8. Don’t tell lies unless you have already plotted them our as pan of a well-planned deception or as part of a carefully crafted cover story.

Anyone who intends to engage in serious intelligence work should practice these rules in every conversation he has in any set of circumstances. I recently bought 3 used car. While we waited for a minor repair on rhe car. the salesman and 1 started talking. By the time we signed the contracts, I knew a surprising amount of inside information about the used-car business and the personal life of the salesman.

The clever intelligence officer does not want to show the world how much he knows or how smart he is; he wants to find out what other people know, how smart they arc. and what makes them tick.

TRADE RESOURCES

There are three things that every intelligence agency¬uses to build the spy’s trust in and dependence on the case officer or its agents: money, drugs, and sex. The private intelligence officer must also have access to those three things in sufficient quantities to sen-ice rhe needs of the potential recruit. He must also develop techniques for using each of them in recruiting different personality types.

80

RUNNING A RING OF SPIES

 


Cold. I lard Cash

Money comes first because without money, you can't buy sex or drugs. Recruiting spies can be a very expensive propo-sition. Often, the only way a case officer can get the recruit's attention is by spending money. He will have to buy the prop¬er clothes to fir the personality he is playing, pay for restau¬rants, entertainment, travel, hotel rooms, rental cars, clothing, technical equipment, and a variety of personal services.

Sooner or later, the case officer will want to offer some payment for rhe information rhe recruit is providing. Even when the recruit is spying for ideological reasons, the case officer will want to make payment for services rendered. Getting a recruit to accept money and preferably to sign a receipt stating he has received the money is the final step in any recruitment. Some recruits will agree to spy for the money; some will only accept money as a loan or an inciden¬tal reward.

Normally, money will come from those who finance the intelligence-collection activity. Sometimes those who are col-lecting intelligence will find that they must self-finance the operation. This might include antigovernment groups intent on spying on government agencies as pan of revolutionary activity. Because many groups turn to such criminal activities as theft to finance rheir revolutions, collectors will find that •.he same techniques they use for recruiting resources can also be used to con unsuspecting people out of cold, hard cash. Such activities arc almost always criminal fraud and are beyond the scope of this book.

Drugs

(“Candy is dandy, but liquor is quicker.”)

The case officer can use a wide variety of drugs in many different ways as a tool for recruitment. If the target has a drug addiction, the case officer might be able to use that knowledge to blackmail him or he might offer to supply the addict with the drug of his choice as a way of making friends or even as a means

IT’S MORE THAN THIXINC: LIES

81

 


of rewarding the recruit for services rendered. It may even he possible for the case officer or one of his agents to introduce the potential recruit to drugs and then encourage an addiction which the case officer can later use to his advantage.

Drugs can also sometimes be used as the grease for developing a social relationship or for conducting a subtle interrogation. There is a lot of truth in the old Latin expres¬sion in vino vtrilas (“in wine there is truth"). The list of peo¬ple who have ler slip their darkest secrets after consuming 3 large dose of their favorite mind-altcrcr starts before the dawn of history and totals in the millions.

Alcohol is always the drug of choice. It is legal in most countries around the world, readily available, and socially acceptable. It relaxes inhibitions, makes people careless, loosens tongues, and impairs judgment. Often the first approach that a case officer makes to a target will be in a situ¬ation in which alcohol is being served. Alcohol can be espe¬cially useful when dealing with an inadvertent spy—someone who will provide information without realizing he is dealing with the enemy.

Although a case officer will frequently use alcohol and other dnigs in dealing with recruits, he must control both his own drinking and the quantity of alcohol consumed by the target during any social occasion. The idea is to ger the target under the influence while maintaining your sobriety and without alerting rhe target to what is happening. There arc a number of different tricks of the trade for limiting one’s own consumption while encouraging the recruit to indulge more heavily.

Often, especially when dealing with people who have 3 drinking problem, all you have to do is allow' nature to take its course. The drunk will be more interested in filling his own glass than in making sure his new friend is matching him drink for drink. Things get more difficult when dealing with someone who expects that the person on rhe other side of the table will match him round for round. The tricks of the trade

«2 R| NNI.NG A RING OF SPIES

 


for ensuring that you stay sober while the target gets drunk include the following:

Prior to a meeting That Vfiii include consumption of alcohol. cal a quantity of fatty food. For example, eat several pieces of bread heavily spread with blitter or a pint of ice cream.

Arrange sei th the bartender to control the drinks, mixing heavy drinks for the target and vtell-diluted drinks for you. (This is one argument for doing your heavy drinking in a setting in which you have the control, say a hotel room, a private home, a diplomatic residence, or a bar where the owner or bartenders are on your payroll.)

Lift du glass to the lips, but don 'I actually sip the. drink.

,'l.r soon as the target's glass is empty, order another round. I <et the waiter rake away your still half-full or. better yet. almost full drink.

Pretending to be much drunker than you are, “accidentally ■■ spill a full glass. You can then miss a round while cleaning up the mess.

One of the most difficult tasks associated with rhe use of alcohol in a social situation is that you must still remember all rhe details of the meeting so that you can record everything the target says once the meeting is done and you have a chance to be alone. While the drinking goes on, you should use every break in conversation or moment of silence as an opportunity to mentally review the previous conversations and actions as a way of memorizing how you will eventually write rhe report of the meeting.

Illegal Drugs

Illegal drugs offer even greater opportunities for gaining psychological control of a target than alcohol can. provided you can control the situation. There ate several ways in which you can use illegal drugs as an aid to recruitment:

IT’S MORE THAN TELLING LIES S3

 


Build rapport with the target by supplying drugs to feed his addiction.

'lake advantage of his dnrg-induccd state in getting infor-mation.

Make the target's use of illegal drugs a reason for blackmail.

Get the target hooked on drugs ro make him more depen¬dent on you.

The best situation is one in which the target IS supplying his own drugs and you simply go along with the situation, rak¬ing advantage of developments as they occur.

However, in some situations you may have to play rhe role of a supplier. You might even use the cover of pretending to he a drug dealer when approaching a known drug addict. The fact that the drugs are illegal makes the case officer and the poten¬tial recruit instant co-conspirators in crime. This, in turn, pre¬sents future opportunities for blackmail.

Illegal drugs are very much a dual-edged sword. Although they can make rhe target easier ro control, they can also make him more careless as he goes about his spying. A person who uses illegal drugs is also at constant risk of being arrested and charged with drug offense and is notoriously untrustworthy when arrested. Most will immediately sell out their supplier and their friends. Also, an illegal drug user can he fired from any job ar any time, especially if the employer randomly tests his employees for drug abuse.

Another major problem with using drugs for recruiting is finding a supply. Case officers working for national spy agen-cies usually have access to all rhe illegal drugs. Sometimes they arc Supplied by rhe intelligence agency, often from Stocks confiscated as part of the government’s narcotics-con- trol operations. Sometimes a case officer will use a service agent he has recruited as a source for illegal drugs that can be used in recruiting new agents.

The private intelligence entrepreneur who is working without the protection of legal cover will have to consider the

84 RUNNING A RING OF SPIES

 


risks in dealing in drugs versus the potential rewards that might result from the use of illegal drugs in a recruitment effort. Frankly, illegal drug use has become such a common occurrence in modern America that intelligence entrepre¬neurs and private collectors should have little trouble in find¬ing a source for the illegal diugs they may require for success¬fully recruiting spies. Even so, individuals who have no expe¬rience in purchasing illegal drugs or no familiarity with the areas of the city where drugs are openly sold arc better advised to look for other ways to subvert a potential spy rather than risk the real possibility of arrest that comes with seeking out a drug dealer.

Although government ease officers will drink alcoholic beverages with a target for recruitment, they will not share the illegal drug experience. Indeed, using illegal drugs, even as part of a cover story, is considered reason for serious discipli¬nary action by the CIA and most other government intelli¬gence agencies.

With the possible exception of an occasional marijuana joint, private intelligence collectors are advised to follow the same practices. This is especially true when it comes to such high-risk activities as sharing needles. When it comes to the use of illegal drugs by a potential recruit, the most important thing is that the recruiter appear sympathetic and nonjudg- mcntal of rhe use of drugs, and nor that he might be willing to share the drug experience.

Because of the major dangers of dealing and supplying drugs, or even being present in places where drugs are used, the ease officer must always be operating under a false flag and a well-constructed false identity.

Sex

Sex won't play a role in every recruitment, but ir can make a critical difference in how successful many recruitments will be. In almost all situations ir should not lie the ease officer who personally services the sexual desires of the recruit. Indeed.

IT’S MORE THAN THI-I.ING LIES

85

 


most national intelligence agencies, including rhe CIA. pro¬hibit case agents from engaging in sexual relations with any recruit. (The exception to that rule may have been rhe old KGB. There are lots of rumors about men and women who were specially trained in the art of seduction by the KGB.)

Instead of bedding 3 recruit, the case agent creates and finances a situation in which the recruit finds what he thinks is true love or maybe just more sexual pleasure than rhe potential recruit knew was possible. If rhe case agenr expects to use sex as part of his recruitment, he will have to also recruit 3 person who will willingly go to bed with the prospec¬tive recruit.

There are several different options for finding potential sex partners for (he recnut to enjoy.

Tukinfi Advantage of an Ongoing Affair

1’rcrecniitmcnt surveillance Will often uncover rhe exis-tence of an illicit sexual arrangement or a budding romance. Almost always, the case officer can take advantage of such a situation, even when it is a legitimate romance. In rhe case of an illicit affair by a married target, there are usually instant opportunities for blackmail, blit the clever case officer may instead choose to become a conspirator in the affair as pan of building a relationship with the recruit. The case officer becomes the good friend who helps facilitate the recruit’s love life by providing excuses for rhe targets absence from family duties, perhaps a private place where the recruit can enjoy the lover’s attention, or even an opportunity for a double date in which the case officer picks up the cost of entertainment.

There IS always rhe possibility that a case officer can recruit rhe love interest 3$ his own agent. This is frequently rhe case in long-term affairs between one married partner and an unmarried colleague. In such situations the single partner is often dissatisfied wirh the hopeless nature of the relation¬ship and Can sometimes be manipulated into spying on the guy she realizes is never going ro ask his wife for 3 divorce.

86

RUNNING A RING OF SPIES

 


She may do it as a form of revenge, or she might be convinced that the final result of her perfidy will he a divorce, with her taking the old wife’s place in the family mansion.

Obviously, homosexual relations, affairs with underage partners, or kinky sex involving sadism or other perversions can offer considerable opportunities to the case officer who can figure out how to manipulate rhe situation to his own advantage. Remember that while blackmail is a powerful tool, it works best if the case officer is not the one making the blackmail threat, but rather the one who Steps forward ro pro¬vide an escape route for the target.

Prostitutes

’The easiest way to provide sex to a potential recruit is to hire a professional and then set it up to make what happens next appear to be a natural occurrence. A frequent ploy is one in which the case officer makes friends with the target and then invites him out for a night on the town. During the course of the evening, they meet a pair of friendly women, who soon agree to go back to the hotel or safe house where the case officer is supposedly living, flow the case officer uses the incident and where it leads will depend on the personality of the potential recruit, whether or not he is married, and, if so, how much he wants to keep the marriage a going concern.

In another ploy, the case officer hires the prostitute, briefs her on w hat he wants done, and then arranges a chance meet¬ing between the prostitute and the target, with the intention that the target will never know that the shy, innocent girl he met one evening was in fact an experienced lady of the nighr.

Many higher paid call girls become very adept at acting out roles in situations where the beneficiary of her services is led ro believe she is an innocent lover. Nevertheless, if a case officer intends to use a prostitute in this way, he had better give her several trial runs to make sure she can be trusted to do what she is being paid to do. For example, the case officer might set up a test run with a service agent and then have the

IT’S MOKE Ti UN TELLING LIES

87

 


service agent report back on how well rhe Cail girl performed her role.

Once the potential traitor has enjoyed the services of rhe girl, or for rhat matter a homosexual prostitute, there arc sev¬eral different ways to take advantage of the situation:

The prostitute, who has been briefed by rhe person paying the bill, can probe for information much like rhe ladies of the Easy Come.

The prostitute can do things that rhe target likes so much that he wants to make another date, and another, and then he becomes a regular customer. The potential recruit soon dis-covers that his new pastime is a very expensive luxury and thar he will have to find a new source of income if he is to keep enjoying the pleasure.

The prostitute plays on rhe target's sympathy, perhaps spinning a rale of how she is entrapped by pimps, but with only a little help from the target she might escape from her awful life. (This works especially well if the prostitute looks very young and innocent and the target has little experience with professional sex partners.)

A person claiming to be the prostitute's pimp starts to harass rhe target, perhaps by claiming that the target hurt the woman during sex and is demanding payment, or by¬attempting blackmail.

The prostitute fakes an injury, a sudden illness, or even an accidental death during lovemaking, and the incident threatens to expose the target's activities for the evening.

In each of the cases in which the target finds himself facing a problem, rhe case officer will be the one who offers a solution.

Anyone who takes up the Career of a professional intelli-gence officer should arrange to have several good prostitutes, both male and female, on tap. How he goes about finding such professionals depends on the country and city where he is opcr¬

8$ RUNNING A RING OF SPIES

 


ating. Pan of (he (mining of any good ease officer should be learning rhe ropes when it comes to finding a witling prostitute. The case officer will. 0Í course, always make any contacts with professional sex partners under a cover identity.

Using a Service Agent

Every good case officer will have several agents he has recruited to work for him. nor for rhe intelligence they can steal bur rather the services they can provide. This can include providing sexual services (0 those targeted for recruitment- provided rhe case officer can find sonic attractive young per¬son who is willing to make (he easy sacrifice for his country, the team, rhe political leader, or whatever other false flag the case officer is flying when he recruits the young person.

Its relatively easy to find young men who will seduce a woman ÍOI the good of (heir country or just a good paycheck for services rendered (even if she may not be much of a catch), but sometimes a case officer can find females just as anxious to do their pan for their country OI their political ideals.

The case agent uses the same techniques to recruit a vol-unteer sex partner as he would for recruiting a primary agent. For example, a CIA case agent might recruit a young female college student 111 a northern European country by ptomising to help her get a work visa in the United States if she will first seduce the son of the deputy prime minister. In another situ-ation. the ease officer might convince a pretty tree hugger to bed an executive working with a logging company to get evi¬dence that can be used in a lawsuit to halt clear-cutting. (The information will really be used by a competitor logger to undercut a bld for a Forest Service log sale.)

In the following example of using a service agent as a sex-ual agent. Doug Kranz worked as an information specialist for a Washington lobbyist doing business with the transportation industry. Kranz was looking for a good spy inside the Interstate Commerce Commission and had identified Martha O’Conner, a secretary working in the office of a deputy com-

IT'S MORE THA.\ TELLING LIES

b*9

 


missioncr. as 3 potential recruit. Kranz’s surveillance had dis-covered that Martha occasionally went barhopping with 3 few female friends in the singles joints of Georgetown, but that the homely and overweight woman always went home alone, though her prettier friends often gor lucky.

Far, 40, and bald, Kranz knew he had little chance at building any kind of personal relationship with Ms. O’Conner: however, he had another recruit sitting in the wings, waiting for just this kind of a problem. Dick Ford, a graduate student at American University, knew Kranz as David Fraser, the executive director of the Air Quality Education Council, an environmental protection political action group supposedly based in Denver, Colorado. Kranz/Fraser explained to Dick Ford that his organization wanted better access to rhe office where Martha O’Conner worked and would pay a substantial sum of money for such access. Dick, whose serious financial Straits were about to force him to drop out of grad school, agreed to take on the job that the man he knew as David Fraser was offering.

The next time Martha O’Conner went along with her friends On a tour of the Georgetown bars, it was Martha who got lucky. At Kranz’s instruction, David bedded Martha sev¬eral times over the next several weeks before taking the next step. When Martha was totally committed to him and the pleasure he was giving her, Dick told Martha he was going to have to drop out of school and return to his home state because of his financial problems. He then mentioned one possibility that might keep him in town and in Martha's bed. He had a friend working with an environmentalist group that would pay good money for a bit of inside information Martha might provide.

Martha was soon hooked, and for the next two years she passed increasingly sensitive executive branch documents on to Dick, who passed them to the man he knew as David Fraser. Both Martha and Dick believed that the information that Martha was stealing was helping an environmental group

9ft

RUNNING A RING OF SPIES

 


fight attacks on automobile pollution controls, when, in fact, Doug Kranz’s boss was using the information in his lobbying efforts for less restrictive legislation and in recruiting new businesses by scaring them with insider information on what new regulations were coining down the pike.

The Innocent Amateur

If some situations, rhe case officer might identify a poten-tial love partner he introduces to the target, or arranges for the target (0 meet, and then let nature take its course. Once love develops, the case officer deliberatelv creates a situation that places (he future of the lovers in jeopardy. Eventually he offers a solution, hut the potential recruit must steal a few harmless documents first.

In the early 196ÔS, Czech intelligence officers succeeded in recruiting a U.S. diplomat stationed in Prague by using such a technique. The primary case officer. Jaroslav Parma, had identified the diplomat, Edwin Trickett, as a man with a roving eye for the ladies. Trickett also had a wife with whom he often argued. Jaroslav found a pretty, young Czech woman, Patricio, who had applied for an cxir visa to visit a brother liv¬ing in the United Sates. The Czech government had denied the visa, the usual practice in those Cold War days.

Jaroslav arranged a situation in which Patricio "accidental¬ly" overheard two strangers talking in a library about how one way to get a Czech exit visa was to have someone from the U.S. Embassy contact the Czech government. One of the strangers mentioned that Edwin Trickett, the administrative officer at the embassy, had done several Such favors for pretty young women. The second stranger said he understood that only worked if rhe young women were willing to “do any¬thing** to get a visa.

Patricio, who so badly wanted to escape life in Czechoslovakia that she would indeed do anything, acted on (he gossip she had overheard. She called the U.S. Embassy and asked for an appointment with Edwin Trickett. Trickett.

IT’S MORE THAN TELLING LIES

91

 


who in truth had never traded intervention on a visa matter for sex. had no way of helping her out but was still intrigued by the pretty Czech woman who seemed so anxious TO do any¬thing ro get a visa. Rather than simply telling her she had bad information, he promised he would try to find a way to help her get the exit visa and suggested that they meet in a few days so he could report what he had found out.

Although he was initially suspicious about Pacricie’s motives, her innocent demeanor and adamant criticism of rhe Czech socialist government soon convinced him that she real¬ly was what she claimed to be. They met several more times outside the embassy and eventually became lovers. After that, frit-ken did seriously Stan looking for ways in which he might help the young woman get out of the country. As his marriage Was floundering he even began considering the possibility that he might divorce his wife and marry Patricie.

Eight weeks later, Edwin was heading for a little afternoon delighr with Parricie when he saw several policemen coming out of Patricio’s apartment building, dragging Patricio with them. Terrified ar what he had witnessed and certain that his illicit romance was about to be exposed. Edwin spent a miser¬able two days waiting for the second shoe to fall. On the third day he received a call at his embassy office from someone call¬ing himself Jiri, who claimed to be Patricio’s uncle and who demanded a meeting with him.

When they met. the uncle told Edwin that Patricic had been charged with spying for rhe Americans and that Edwin W3S going to be named as rhe intelligence officer who was her control officer. Jiri, who claimed to be an upper-level bureau¬crat in rhe Ministry of Industry, explained he had pulled a few strings and arranged to meet with his niece in her cell. She had vehemently denied she was a spy but had admitted her affair with the U.S. diplomat. Jiri had pulled more strings and was hopeful that he could get the charges against his niece dropped, provided that Edwin was willing to meet with a Czech security officer and convince him that Edwin was not a

92

RUNNING A RING OF SPIES

 


CIA officer bur a legirimare diplomat. If Edwin failed ro con-vince the security officer of that, then Patricie would be tried as a spy. The Czech government would also declare Edwin persona non grata and expel him from the country. That, in turn, would expose Edwin’s affair to his employer, coworkers, and family.

Edwin agreed to such a meeting. The security officer with whom he met was, of course, Jaroslav Parma. Parma grilled Edwin for several hours about his work as an adminisưative officer in the U.S. Embassy. Edwin’s embassy job was, in fact, a dull administrative job that had nothing to do with either policy or the collection of intelligence.

As Parma listened to the diplomat talk about his daily drudgery, Parma became friendlier and friendlier, assuring Edwin that he believed what Edwin was saying. Over the ncxr two weeks, Parma arranged for three more meetings so that he could gather more details, explaining that while he was convinced that Patricie was innocent, he still had to con¬vince his superiors of that. Parma also warned Edwin that he should not tell anyone in the embassy about his problems, because that would only make it more difficult to arrange Patricie’s eventual freedom—advice that Edwin was only too anxious to follow. Finally, in the third week, Parma arranged to allow Edwin to visit Patricic in the jail.

Left alone with Patricio in her cell, Edwin listened to the terrified woman as she described her interrogation by rhe Czech security police. Yet, even though near hysteria, Patricio pleaded in whispers with Edwin that he nor do anything for the Czech government. She insisted that Edwin forget he ever knew her and that he get out of the country as soon as possible. Patride’s obviously sincere concern for Edwin and her willingness to sacrifice her own life only helped to con¬vince Edwin that he must do everything possible to help rhe woman he loved.

Edwin left the jail absolutely certain that Patricio was an innocent victim, which in fact was true. In his next meeting

ITs MORF. THAN TH J.ING LIES 93

 


with Parma, the Czech security officer assured Edwin that things were moving in the right direction. The only problem was that he needed something extra to convince his superi¬ors that Edwin was sincerely trying to help rhe young Czech woman. He suggested that it would he very helpful if Edwin could provide a few embassy documents for Czech intelli¬gence. Parma assured Edwin that the documents didn’t have ro be classified, but rather could be something as common as personnel and administrative manuals. Parma promised that with just a bit of cooperation, Edwin could Solve both Patricio’s legal problems and also avoid the exposure of his little love secret.

The nexr time he met with Parma, Edwin took with him a complete set of U.S. State Department’s administrative manuals. While they were marked Official Use Only, they were typical bureaucratic rules and regulations of personnel con¬duct and administrative procedures for letting contracts out for bid. signing rental agreements, ordering supplies, running the embassy commissary, and hiring local employees.

Two days later, Jaroslav Parma told Edwin that Patricic had been released into her uncle’s custody. Parma warned Edwin that the case was still not closed and suggested that it might be necessary for Edwin to again demonstrate his will¬ingness to cooperate with the Czech government. Jaroslav then promised that if Edwin would continue to cooperate until his tour in Prague was up. the Czech government would grant Patricio an exit visit, which would allow her to leave the country for rhe United States.

Edwins wife had recently returned to rhe United States for a vacation with her aging parents, so Edwin was able to spend Patricio’s first night out of jail with her ar her uncle’s house. Once they were alone, Patricio again pleaded with Edwin to do nothing to help the Czech government and to forget about her. advice that Edwin refused to accept.

Happy to have Patricio free, and optimistic that he would succeed in eventually getting her out of Czechoslovakia,

94

RUNNING A RING or SPIES

 


Edwin was an easy mark for the next step in his fccruirmcnr. For the next several months, each time Edwin passed Parma a new set of documents, rhe security classification stamped on the documents crept a little higher. While Edwin did nor nor-mally have any reason (0 see classified material as part of his job description, his responsibilities as the embassy adminis-trative officer gave him easy access (0 all sections of the embassy, including the classified document storage areas.

Who knows how long It would have gone on if Edwin had been a bit more cautious. But the embassy security officer noted that Edwin was spending a lot of rime in rhe classified- document storage vault and got suspicious. He did a bit of police work, and Edwin got caught. Edwin was charged, con-victed of treason, and sentenced to 3 long prison term in a fed-eral penitentiary in the United States. No one on the U.S. side knows what happened to poor Patricie.

IT’S MORL TUAN TELLING LIES

95

 

 


Chapter Nine

The Case Officer at Work

L

et’s lake a look at a successful recruitment from

start to finish, using an example dial dates back to

rhe Cold War when the new Communist govern-

ment in Cuba was expanding its influence in Latin America.

The CIA policy staff, with the approval of the National Security Council, determined in the mid-1960s (hat more infor-mation was needed on Cuba's subversive activities in Venezuela, rhe policy staff asked that the CIA station in Caracas identify and recruit someone working inside the Cuban Embassy in Caracas who might provide such information.

rhe CIA station chief in Caracas assigned a ease officer, I larold Doyle, the responsibility for doing so. Dovle was already running a surveillance operation on the Cuban Embassy out of an apartment building across the street from (he embassy. 'Hie surveillance had identified several Venezuelan nationals who worked in the embassy, including Tomasina Lopez, who worked as a cook in the embassy cafcieria.

Helena Chavez, a Venezuelan national, was working for Doyle as an access agent. Helena was a middle-class college dropout who had long been fascinated with American movies, fashions, and men. She had been working as an employee uf rhe CIA for four years. Although she considered it a good job

97

 


with good pay, rhe work also gave her access to the U.S. male diplomats working in the embassy, one of whom she hoped might eventually fall in love with her and propose. Helena had once gone tn rhe United States for four months of CIA training and was regularly “fluttered” (polygraphed) to ensure her loyalty to her employer.

Helena approached Tomasina Lopez while rhe latter was attending mass and made friends with her. Helena learned that Tomasina never left the embassy kitchen while she was working and that she knew almost nothing about rhe Cuban nationals who worked in rhe embassy. Tomasina was nut a good prospect for recruitment as cither a primary agent or an access agent.

However, Helena also learned that Tomasina had an adult son, Jorge, who was desperately looking for work. Tomasina complained in her conversations with Helena that it was too bad that Jorge wasn’t a better driver because the Cuban Embassy was looking for a new chauffeur.

A surveillance of Jorge found him co be in desperate straits indeed. He owed money, his wife was about to produce their second child, and he had been blacklisted by a foreman of a U.S. oil company where he once worked after he had been caught distributing pro-Castro propaganda sheets to fel¬low workers. Helena arranged to meet Tomasina while she and her son were walking together on the street and was thus introduced to Jorge.

A couple of days later. Helena “accidentally” bumped into Jorge in a crowded department store. Pretending to find Jorge an attractive male who interested her, Helena accepted Jorge s quick invitation to share a aafeciro. After sounding him out during several subsequent meetings over coffee and veri¬fying that he was ready to do about anything to cam money, she introduced Jorge to Harold Doyle, again in what appeared to be a chance encounter. Harold, using the name Brent Stoker, pretended to be a Canadian journalist who was writing for a leftist news magazine and who was looking for victims of

98

RUNNING A RING OF SPIES

 


L’.s. imperialism co write about. Jorge was only too happy to spill his talc of woe about his mistreatment at the hands of an American-owned company.

In appreciation of Jorges contribution to the story he claimed to be writing, Harold paid for Jorge to take a week¬long driver s education course, as the only student of a special tutor. As soon as Jorge finished the course, Tomasina asked her supervisor in the Cuban Embassy to help get Jorge the job as an embassy driver.

Once Jorge was working in the Cuban Embassy, Harold— Of Brent Stoker as Jorge still knew him—suggested that Jorge could help him with a new story, one trying to put a human face on the Cuban diplomat working in Venezuela. All Jorge would have to do was report on what diplomats talked about while riding around in embassy cars. A promise to pay off Jorge’s debts if the information proved useful convinced Jorge that he could help the friendly journalist gather that kind of information without compromising his loyalty to his new employer. Joking that his Cuban employers might get suspi¬cious if they saw Jorge meeting with a gringo, even a Canadian gringo, Harold suggested that Jorge pass on what¬ever information he overheard to I lelena.

One of Harolds support agents rented an apartment in a lower-class housing area, where Helena took up residence. Jorge began visiting Helena once or twice a week for what would appear to anyone following him to be for romanric pur¬poses. Helena, on her own initiative, began bedding Jorge dur¬ing his visits as well as debriefing him W’hile they showered together on what he had learned while working in the Cuban Embassy. .After he left, Helena would write up the information and pass it on to the U.S. Embassy case officer.

Because he was earning two incomes and gening lots of sex on the side while his wife recovered from the birth of their second child. Jorge didn't spent a whole lot of time worrying about the identity of the mysterious Canadian. While he learned nothing of immediate intelligence value on the job.

THE OSE OFFICER AT WORK

99

 


he was learning .1 lot about the Cuban diplomats, mostly by listening to the gossip of embassy wives he often drove on shopping excursions and trips to charity events.

One of those wives. Dora Martinez, was married co a first secretary in rhe Cuban Embassy. Silvestro Martinez. On sev¬eral occasions Jorge drove Silvestro (0 parks and other public places where Silvestro would meet with Venezuelan students and other Venezuelans who appeared to he ordinary work¬men. This activity suggested that Silvestro was working with Student and labor groups. He would have exactly the kind of information that Harold Doyle was hoping to collect.

Jorge also reported through Helena that Silvesrre Martinez was not getting along with his immediate supervisor and that the embassy gossip was that Dora Martinez was sleeping with the supervisor.

All this suggested that Silvestro Martinez might be recruited as a spy. if he was handled the right way. Harold Doyle, the station chief, and other C1A colleagues began to plan out how the approach would be made and agreed that Doyle would make the approach using the cover of a Canadian journalist.

Before they could initiate the plan, Jorge overheard two senior Cuban Embassy officials, one of whom was Silvestro’s supervisor, discussing how they planned to transfer Silvestro Martinez back to Havana. One of the careless diplomats also let it slip that Silvestro’s wife, who held an embassy position as a secretary, would remain in place in Caracas, at least for several months. Even Jorge could figure out that Silvestro was getting a career shaft so thar the Supervisor could have easy access to the wife.

Harold Doyle discussed the situation with the station chief, and after an exchange of telegrams with CIA headquar¬ters in Langley, Virginia, they decided they did not have enough time before Martinez’s transfer back to Cuba to carry out the usual recruitment procedures, which can often take weeks or even months. Instead, I larold would try a cold pitch.

100

RUNNING A RING OF SPIES

 


(Although seldom used as a recruitment technique and almost never successful, a cold pitch is a direct approach with no prior contact. Someone walks up to the potential recruit while he is in a public place and makes an offer that, it is hoped, the tar¬get will find too good to turn down.) A cold pitch is used only as a last resort, but this did appear to he the kind of situation in which there was no other choice, especially since none of the other diplomats in the Cuban Embassy offered likely prospects for recruitment.

Harold approached Silvcstre Martinez while they were both attending a National Day Party at the Mexican Embassy in Caracas. Catching Martinez alone for a moment in a room¬ful of people. Harold starred the usual chatter that makes up so much of rhe inane conversation at diplomatic entertain¬ment functions. Halfway through the second sentence, when he was sure no one was listening, he dropped his voice to a whisper, moved his face closer to Martinez, and in a half¬dozen short sentences made an offer. He let Martinez know how much they knew about him and about his wife’s affair with his boss—news that apparently Martinez suspected but didn’t know for sure. Doyle then suggested that the best way Martinez could take revenge would be to accept an offer of a lump-sum payment of $20,000 and a regular income deposit¬ed in a Sw iss bank account for passing on information to the Americans during the time Martinez still remained in Venezuela.

After Martinez returned to Havana he would become a U.S. mole inside the Cuban Ministry of Foreign Affairs. While Martinez spied for the Americans, his Swiss bank account would grow. Harold promised that after 10 years the CIA would smuggle Silvestro out of Cuba so he could enjoy his wealth in Miami-

Martinez must have already figured out what was hap¬pening to him and his career and had been considering possi¬ble alternatives. He immediately rejected the suggestion that he return to Havana as a mole and instead proposed that he

THE CASE OFFICER AT WORK 101

 


defect, provided rhe Americans made a lump sum payment of $30,000 and set him up with a new identity in any American city he might choose. In return. Martinez would tell every¬thing he knew about Cuban foreign policy and propaganda efforts in Latin America. Martinez also insisted that there must be no public announcement of his defection. He want¬ed to simply disappear.

Doyle was not surprised at die counteroffer. It was one of rhe possibilities they had planned for, even down to how much they might offer as payment (Martinez could have gotten $50,000. if he had insisted). Doyle agreed and suggested that the defection take place that very evening. When Martinez, nodded his head in agreement, Doyle described a taxi that Martinez would find parked on a street near the embassy and suggested that Martinez might want m go find it.

The entire conversation had taken less than five minutes. The two men walked off in different directions, and two min-utes later, after a few brief words with another American col-league, Harold Doyle was listening to a vacuous explanation of Venezuelan politics offered by a half-drunk Peruvian diplomat.

Martinez didn't calk to his wife before he slipped out to find the taxi waiting to cake him into exile. The taxi cook Silvestro Martinez to a safe house in the suburbs where he spent the next three months with CIA debriefers. During that time, the Cuban Embassy frantically searched for the missing diplomat. On several occasions, its spokesmen made public demands that the Americans tell them what had happened to Martinez, but they had no proof that the U.S. Embassy had been involved in Martinez's sudden disappearance.

Jorge heard dozens of different rumors discussed in the backseat of the embassy car he drove, including one wife sug-gesting to a friend that Silvestro’s supervisor had arranged to have Silvestro kidnapped and killed because Silvestro had found out about the supervisor’s love affair with his wife and threatened to go public with a complaint.

CIA interrogators prepared several hundred pages of

102

RI.SMNC A RING OF SPIES

 


raw data based on the lengthy debriefing of Silvestro Martinez. '1 he station repons officer then reduced the data to several dozen intelligence reports and forwarded them (0 CIA headquarters.

With the debriefing completed, the station sneaked Silvestro Martinez out of Venezuela on board one of the U.S. Air Force Boeing 707s in the executive fleer. The aircraft had flown a group of U.S. Congressmen to Caracas for an inspec¬tion on the progress of U.S. economic assistance programs.

Today Silvestro lives in Miami. I le has a new name, a new wife, a new career, and he avoids anything having to do with politics. Everyone who knows him as his new identity, includ¬ing his new wife, thinks he was once a utility worker who fled Cuba on a raft

A dozen different CIA analysts working under the direc¬tion of rhe deputy director for intelligence (£>D1) reviewed the intelligence reports on the debriefing of Silvestro Martinez. The information was condensed into a four-page intelligence dissemination report, which was then edited and rewritten a half-dozen times.

The staffers in the CIA responsible for the final dissemi-nation of the report on rhis operation were not happy with (he results. First, they criticized the station and Doyle for not con-vincing Martinez to remain in place. They also criticized Doyle for allowing Martinez to defect without a public announcement. But what most bothered the Washington wiz¬ards was that (he information provided by Martinez didn’t support the U.S. foreign policymakers' own beliefs about Cuban diplomatic activities in Latin America.

Although Martinez had confirmed that rhe Cuban govern-ment was committed to spreading revolution in Latin Amenca, he described the Cuban diplomatic effort as inept, incompetent, and disorganized. He portrayed the Cuban diplomatic corps as a col¬lection of competing careerists who were frightened of their own security investigators and incapable of taking advantage of new opportunities that occasionally developed in host countries.

DIE CASE OFFICER AT WORK

103

 


Because most of the CIA intelligence reporting in that area described rhe Cuban revolution as a major threat to (he development of democracy in Latin America—a threat that required a massive infusion of both economic development assistance and covert political action—the agency’s bureau¬crats decided that Silvestro Martinez must have been a disin¬formation plant. They therefore limited the dissemination of the report to a few top-level policymakers within the intelli¬gence community, with a cavear as a cover sheet, warning that the information might not be reliable. In $0 doing, they demonstrated the basic principle that "ủũd intelligente has no value if the recipient is not willing to act on that which proves the recipients previous beliefs were wrong.

104

RUNNING A RING OF SPIES

 


Chapter Ten

When a Private Citizen Recruits

N

ow that wc have seen how governracm espi-

onage agencies work, let’s cake a look at how a

person with no connection to any government or

political group can spy successfully. This example involves

the simplest kind of spying: a situation in which one individ-

ual wants to know what another individual is keeping secret.

Janet Thompson suspected that her husband. Bill, was having an affair with his secretary, Mandy Shumway, and that he might be planning on leaving Janet and her two teenaged children. Bill was the owner/manager of a real estate invest¬ment firm worth several million dollars. Janet would have happily given Bill a divorce, provided that she got half the value of his business (something guaranteed by the community-property laws of the state where they lived). She feared, however, that Bill might be moving funds our of the firm into secret bank accounts and that she would wake up one day CO find Bill long gone, leaving her nothing but a com¬pany stripped of cash and facing bankruptcy. On (he other hand, if Bill was engaged in nothing but a short-time fling, Janet was willing to let the flame burn out—provided the company profits kept rolling in.

Because Bill was well known in the community. Janet didn’t want to discuss the issue with a local lawyer or private

105

 


defective, for fear that Bill might learn about her suspicions and take preemptive action. Janet instead discussed her prob¬lem with her brother, Ted Monet, a career military officer who was assigned as an assistant air force attache in rhe U.S. Embassy in Singapore and who was visiting the United Stares on home leave.

Ted, with three more weeks of leave on his hands and already bored with staring at the lake in front of his vacation cabin, decided to make It a busman s holiday by practicing a few of the skills he had learned as a military intelligence offi¬cer. He called two old military buddies and invited them and their wives down to share the lakeside house where he was staying, explaining the entertainment he was setting up for the occasion as an extra enticement. Both the couples arrived two days later, anxious (0 get on with the spy game Ted had promised as a diversion.

Ted assigned one of the two couples, Sylvia and Terry Mineta, to a full-time surveillance of Mandy. The other cou¬ple. Dawn and Craig Wallop, began 3 surveillance of the investment firm with (he intention of identifying possible sources working for the husband who might report on what was happening inside the company.

Sylvia and Terry’ quickly confirmed that Bill and Mandy were engaged in a hot and heavy romance, often taking long lunch hours together as well as spending lots of time in the office “working late” after the other employees went home. They continued the surveillance while looking for a possi¬bility of a chance meeting with Mandy and Bill when they were together.

Craig and Dawn, using information provided by Janet, identified three people who worked at the firm who might know something about how Bill was managing the cash flow. One of the employees, Mark Weiss, attended the local Methodist church with his family every Sunday morning. The Wallops also learned that the Weiss couple were avid dupli¬cate bridge players.

106

RUNNING A RING OF SPIES

 


The Wallops went to the same church the next Sunday, telling everyone they met that they were planning to move into rhe area. They met the Weiss family and quickly "dis¬covered” a mutual interest in duplicate bridge. Mrs. Weiss not only suggested that the Wallops corne to their next bridge game, but also invited the new friends home for a Sunday brunch.

By the time the four people got to the dessert. Craig had let it slip that he was looking for some investment property and that the planned move ro the city depended on what properties might be available. Mark readily volunteered the fact that he was associated with a real estate investment firm and then let it slip that he wasn’t very happy in his job. Answering a few friendly questions, he explained some of the reasons why, including vague references to some strange investment moves by the company president.

Craig, dropping hints that he might have 3 lucrative employment opportunity for Mark if things worked out. got Mark to talk in inorc detail and learned that what bothered Mark most about his job was that Bill had recently made a number of business decisions on mortgages and property sales that didn’t make a lot of sense in the cunent market.

Ted spent his time ar the local county courthouse, col¬lecting all the available information on the properties that were owned or managed by Bill’s company. Ted discovered that new loans had recently been taken out on several pieces of property for the maximum amount possible, while the bank loans on three other pieces of property had shortly (hereafter been paid off.

Next. Ted spent a few hours with a desktop computer, a scanner, a color printer, and several packages of plastic identi-fication card cover material. Armed with a complete set of fake documents, he called ar rhe escrow company that usual¬ly handled the escrow accounts of Bill's company. Announcing himself as a special agent for the IRS and flashing documents to prove it, Ted was ushered into the manager’s office. The

WHEN A PRIVATE CmzEA RECRvnx 107

 


manager quickly agreed to cooperate with the investigation led claimed he was conducting on Bill’s company.

With the manager's Cooperation, ’led learned that an escrow account had been opened on one of the pieces of prop¬erty on which the outstanding loan had recently been paid in full. The closing date was set for September 15, just two weeks away. Ted pulled his same act with the two other escrow com¬panies in the area. He found an escrow account had been opened on another piece of property in one of the companies with the same closure date. The manager at the third escrow company refused to release any information, insisting that led first get either a search warrant or a court subpoena.

Promising he would immediately do so. Ted suggested he would rather not go to rhe trouble if there was nothing to sub poena. The manager then confirmed that if the TRS agent presented a subpoena, he would ger records of interest. Ted thanked rhe manager and left, now certain that Bill was going to sell three pieces of mortgage-free property on rhe Same day for a combined total of something in the neighborhood of four million dollars.

Sylvia and Terry followed Bill and Mandy one evening to a small French restaurant located in a nearby city. Sylvia and Terry also ate in the restaurant, sitting at a table near Bill and Mandy, but paying attention only to each other. The Minctas left the restaurant a few minutes before Bill and Mandy and then spent some time necking in their car. breaking up rhe session with just enough lime to deliberately crash their car into Bill’s as he and Mandy drove out of the parking lot.

Profusely apologizing and accepting full responsibility for the accident, Terry offered to pay all the repair costs, provid¬ed Bill didn’t call the police or involve the insurance compa¬nies. Playing the frightened man afraid he’s about to be found out. Terry confessed that he and Sylvia were not married to each other. While Terry arranged to pay for the repairs to Bill’s car (giving a fake address to which Bill was supposed to send the repair bill), Sylvia started talking to Mandy, tricking her

IOS

RUNNING A RING or SKIES

 


into admitting that site was in rhe same situation as Sylvia- daring a married man, with all the troubles that go with the territory. Sylvia suggested to Mandy chat rhe two of them ought co ger cogcchcr once in a while to keep each ocher com¬pany. Like most women dating married men, Mandy spent a lot of lonely evenings while Bill was home with his family. She jumped ar rhe chance for a new friend who understood and sympathized with her situation.

Sylvia invited Mandy to dinner the next evening that Bill stayed home with his family. Sylvia monopolized the early part of the conversation by telling a tall tale about her hope¬less situation; she knew her lover was never going to divorce his wife. When Sylvia suggested that Mandy'S situation was probably just as hopeless. Mandy bragged that she was much luckier, adding that she and her lover were about to elope. Although not giving all the derails, Mandy explained that Bill and she would soon leave for New Zealand, where they were going to start life over aS a married couple under a new iden¬tity. Mandy added a long rationalization for why Bill was jus¬tified in abandoning a bitchy wife and two spoiled teenagers who had no respect for their father.

Putting everything together, Ted knew that Bill was indeed going to elope with Mandy. He planned to take the payments for the three pieces of mortgage-free property and transfer the funds to foreign bank accounts and then jump the first plane to New Zealand, where he expected to live out the rest of his life with Mandy. Janet would not only be left with nothing but a bankrupt company, she would also probably be stuck with the responsibility of paying off the capital gains taxes on the properties Bill sold.

When Ted presented Janet the evidence he and his friends had discovered, she hired a lawyer who took immedi¬ate action. Two days before Bill expected to finalize it all and head for New Zealand, a process server handed him a collec¬tion of subpoenas that would not only take him into court for divorce proceedings but prohibited any monetary withdrawals

WHEN A PRIVATE CITIZEN RECRUITS J 09

 


from the escrow accounts until after the property settlement.

The first time rhey met in 3 courtroom, Janet twisted the knife a bit by telling Bill chat it was his girlfriend who had blown the escape plan by talking too much co a new friend.

In the final settlement. Janet got most of rhe money from rhe escrow accounts. Bill got stuck with the heavily mort¬gaged properties in a falling real estate market, and Mandy moved to another state without giving Bill her new address.

IS SPYING WORTH THE TIME. MONEY.

EFFORT. AND RISK?

That's the question everyone considering spying on someone else must ask. Foi Janet, rhe answer was obviously yes. By spying on her husband, his business, and his girl¬friend. Janet was able to take timely action that saved her and tier two children from Severe economic and emotional dis¬tress. Furthermore, she obtained the information at a mini¬mum cost because of her brothers expertise and his willing¬ness ro not only work for free himself, bur to recruit four oth¬ers to work with him. Her brother did take what some would describe as an unacceptable risk when he pretended to be an IRS Special agent, but even chat risk was minimal in that Ted made only three calls on three different people on the same day while using the fake ID. He never made any further con¬tact with the people to whom he showed the computer-gen¬erated fake credentials.

Spying Alone Won’t Guarantee Victory

Many historians and critics of the U.S. intelligence effort through the Cold War agree that the KGB won the spy war in the field of coven information collected by using recruited Spies. Over chc years, the KGB and irs allies achieved repeat¬ed success in recruiting spies like Whittaker Chambers, the Rosenbergs, Kim Philby, John Walker, Richard w. Miller, Aldrich Ames, and, of course, U.S. Marine security guard Sgt.

110

RUNNING A RING or SPIES

 


Clayion J. I.onetrcc. (These and others were all found out. We must assume there were many more spies for (he Soviet government w ho were never discovered.)

On the other hand, the CIA was notably unsuccessful in (heir attempts ro recruit spies inside either the Soviet Union nr any of rhe Soviet bloc countries. (Those good spies we did get were mostly walk-ins. and most of those were eventually exposed by rhe spies the KGB recruited from our side.)

The reasons the CIA failed so miserably in recruiting good sources inside the Soviet Union and Soviet bloc coun¬tries are many. One obvious impediment was the difficulty of gaining access to potential spies in a tightly controlled totali¬tarian system that puts severe limitations on personal free¬doms. The Soviet government watched its citizens, especial¬ly those with access to government secrets, in ways that can never be employed in a free society. For (he Soviet citizen, the risks of spying were simply too great and the chances of enjoying any rewards too small. Soviets who might have turned to spying were more interested in getting out of (he system than in staying inside the system while making money on the side by selling secrets.

Yet, despite the fact (hat the KGB won the spy war. the Soviet Union is history, and the world now has only one super-power, the United States of America. Good intelligence never guarantees victory, and bad intelligence doesn’t necessarily ensure defeat. Knowing the enemy's secret plans won’t do much good if his army is bigger, better equipped, belter trained, better motivated, more combat ready, and holding the high ground.

Throughout the Cold War the KGB was playing catch-up. It did steal our atomic secrets, but by the time the Soviet Union had built irs first atomic bomb wc were already stock¬piling hydrogen bombs. The Soviets got ahead of US just once, (he launching of rhe first satellite, but even after Sputnik wc quickly caught up. and we didn't have to steal any of their secrets to do it.

WHEN A PRIVATE CmzKN RECRUITS 111

 


Soviet secrets were things we didn't have to know or things we already knew. Indeed, critics of the CIA insist that much of the money spent in attempting to recruit spies inside die Soviet government not only failed to get good intelligence information, but even if they had Succeeded, what rhe CIA would have learned would not have been worth the money- spent On collecting the intelligence.

Even when we did get good intelligence, it was often ignored because it suggested that the Soviet Union was not the dangerous monster our politicians tried to make it our to be, but rather a disastrous economic and social experiment that was doomed to failure, regardless of what we did to Oppose it.

The Expected Results of spying Must Justify the Costs

Anyone who decides to take up spying needs to ask the questions the U.S. intelligence community never asked itself before asking Congress for lots of money: what exactly does one expect to learn, and will the information be valuable enough to justify- the cost and the potential risk?

In the case of Janet Thompson, the information on what her husband was planning was well worth the small cost and even the risk her brother took. But let’s look at another exam¬ple of private spying.

Jeffery Zwcibcl was the chief executive officer at Modem Fashions, which produced and sold economy-priced women's clothing that pretended to be high fashion. For several years Modern Fashions had run a close second in sales to Parisian Day. Zwcibcl was concerned that Parisian Day was starting to pull ahead in both sales and profits, even though both compa-nies sold similar products at about rhe same price.

While attending a high school reunion, Jeffery met an old friend, Terry Daniels, whom he hadn’t seen in 25 years. Daniels had just retired at age 50 from a government job in which he had worked overseas in a half-dozen different coun¬tries. As the two men renewed their friendship, Terry had lit-

112

RUNNING A RING OF SPIES

 


lie to say about what he did for the government. He was much more interested in listening to Jeffery talk about his business.

After Jeffery- complained about how he was losing out to the competition. Terry suggested that Jeffery ought to do sonic spying on the opposition and learn what secrets might be responsible for Parisian Day’s success. When Jeffery com-plained that he didn’t have any idea how to launch such an effort. Terry offered to help Jeffery out. bur warned his friend that a good intelligence collection effort would be expensive. When Jeffery asked how expensive, Terry began scribbling on a notepad as he worked out how much he would have to charge to recruit several spies inside Parisian Day. The proposed six- figure price staggered Jeffery, and he rejected the plan.

hour weeks later, one of Modern Fashions’ biggest buyers announced that she was dropping rhe Modern Fashions line and would be buying exclusively from Parisian Day. Convinced that Parisian Day had done something dirty in excluding Modern Fashions from a major market, Jeffery called Terry and, out of desperation, agreed to the proposed terms for running a spying operation against Parisian Day.

Over the next several weeks. Terry, working with several service agents, successfully recruited five Parisian Day employees as spies.

The first recruit was Tonya Lopez, a cleaning lady. A mid-dle-aged, single mother. Tonya had a 19-ycar-old son, Eduardo, who had recently been arrested and charged with aggravated assault following a street gang fight. While waiting in the courtroom for a hearing on the charges, Tonya met Imelda Melendez, a young woman who claimed to be work¬ing for one of the many advocacy groups that serve the city’s poor. Imclda arranged for a lawyer, who got the charges against Eduardo reduced to a misdemeanor with no time in jail. ( Tonya never noticed that Imelda helped only one person in a courtroom full of defendants.)

Several days later, Imelda told Tonya that the advocacy group she represented was investigating the abuses of work-

WHEN A PRIVATE CniZ£N RECRirrs 113

 


crs in the garment industry. Using implied threats that Tonya’s son could find himself hack in court facing new felony charges, combined with the offer of regular cash pay¬ments, Imelda convinced Tonya that she should begin spying on her employer.

Tonya was soon passing on to Imelda the contents of the trash cans in the Parisian Day executive office. She also plant¬ed Several different listening devices in such places as the CEO’s office, her conference room, and the ladies’ bathroom. Just as important, Tonya told Imclda a great deal of informa¬tion about the people who worked at Parisian Day: their names, their positions, whar kinds of private things they kept in rheir desks, the telephone numbers in their Rolodexes. descriptions of their cars and their license plate numbers.

David Misisco worked as a midlcvcl executive in the Parisian Day sales office. David was angry that a female col-league had gotten a promotion that he had wanted and was con-vinced that she had gotten the promotion only because of affir-mative action. David complained bitterly about his situation to his new friend, Joe Killory. whom he met while taking a night course in salesmanship at a city college. A sympathetic Killory let it slip that he sometimes sold information and suggested that there were people who would pay good money for inside infor-mation on Parisian Day’s sales campaigns. Although Killory wouldn't say who his customer might be. David assumed it was Modern Fashions. He happily agreed to become a spy inside Parisian Day. David not only enjoyed rhe money that Killory (really Daniels) started paying him, he also got 3 major kick our of playing spy with all the dead drops, secret meetings, and sur-veillance-evasion training that Daniels provided.

Regina Menus, who worked in the Parisian Day executive secretary pool, met Donald Snell ar a church social and soon fell hopelessly in love. Snell, who told Regina he worked on Wall Street as an investor, promised to marry her as soon as he cashed in on several investments he had made based on insid¬er information. Then one day Donald appeared at Regina’s

114

RUNNING A RI.XX: OF SPIES

 


apartment, wearing a terrified expression and telling her that 3 stranger had approached him on the street and handed him an envelope containing evidence of his insider-trading activity. The blackmailer didn’t want a monetary payoff to keep him from passing the information to the Security and Exchange Commission; he wanted Donald to convince Regina that she should begin spying on her bosses at Parisian Day.

At first Regina refused, but after several nasty lovers’ spats, a Threat of suicide, and a promise that she would only have to go along until Donald could cash in the trades and col¬lect the profits, she met with a stranger (Terry Daniels, of course), who taught her how to pass him information through a dead drop.

Terry also succeeded in recruiting a delivery driver and one of rhe Parisian Day bookkeepers. Alan Srremple.

This was a casebook study in how to recruit and nin a ring of spies. Each of the spies had been recruited under a differ¬ent false flag, and none of them knew about the others.

Six months after putting Terry on the payroll, Jeffery knew all the secrets there were to know about Parisian Day. He had learned that Parisian Day was contracting our most of its sewing work to sweatshops that employed undocumented aliens, that its bookkeepers were cooking the books to avoid income taxes, and chat it was stealing pattern designs from the more expensive fashion houses. These, however, were also things that Jeffery was doing at Modern Fashions.

Jeffery also had a foot-high file with the details of Parisian Day’s production and sales procedures. He had the list of cus-tomers, the total sales figures, production costs, personal details on buyers, and just about everything else that someone ar Parisian Day had written down over the last five years. He had drawings of Parisian Day’s planned fashion designs, its distribution figures, and advance information on its advertis¬ing campaigns.

Jeffery also knew a lot about the people who worked at Parisian Day, including rhe CEO, Donna Sposato. He knew

WHEN A PRIVATE CITIZEN RECRI ITS 115

 


thar Donna’s current lover was Sharon Katzke. something that David didn't know. Jeffery also knew the current balance in Ms. Sposato’s personal bank account, what medication she was taking, and where Donna and Sharon did rheir social drinking as well 3S rhe bed and breakfast where they often spent week¬ends. He had the same kind of personal information on every single executive working for Parisian Dav.

Yet, despite the stacks of documents and reports from the spies he had working inside Parisian Day. Jeffery didn’r have a single bit of actionable intelligence, that is, information he could use to gain an advantage over the competition.

The simple fact, which Jeffery refused to consider, was that while Modern Fashions and Parisian Day produced almost identical lines of clothing, Donna W3S a better manag er and CEO than he was. Most people liked working for her. and they worked just 3 bit harder at Parisian Day than ar Modern Fashions. This influenced the way that Parisian Day employees dealt with customers, who, as a result, liked Parisian Day sales and service personnel more than they liked those working for Modern Fashions. Therefore, if all other factors such as price, quality, and fashion design were equal, which they usually were, buyers would give as much business as they could to Parisian Day.

If Jeffery had bothered to ask just about anyone in the fashion industry why he was losing business to Parisian Day, they might have told him rhe truth. But he wasn't the kind of man who would ever admit to himself that anyone knew the fashion business better than he did.

Desperate to use the intelligence he had paid so much to obtain, Jeffery finally decided rhe best way to hurt Parisian Day would be lu pass on the information he had on Parisian Day’s tax avoidance to the IRS- He did $0, and Parisian Day soon had a visit from IRS examiners that would eventually cost the company more than a hundred thousand dollars.

Even here, Parisian Day was served by its employees. The head of accounting quickly identified midlcvel bookkeeper

116 RUNNING A RING OF SKIES

 


Ahn Stremplc as rhe source of the information that had been passed ro the IRS. Donna immediately fired Stremple. and her senior accountants were able to neutralize most of the damage he had done. Airhough Parisian Day did have ro pay back taxes, the total amount was a great deal less chan what the IRS offi¬cers had been led to expect they would collect.

An angry IRS supervisor then decided co look closely ac other businesses in the garment industry, starting with the name he already knew. Jeffery did nor have bookkeepers who were as clever or as loyal to the company as Parisian Day’s. Jeffery’s bills for back taxes, combined with his business loss¬es, forced him into bankruptcy.

Avoiding Intelligence Mistakes

Jeffery's first mistake was forgetting the primary rule of business: keep your eye on the customer. What he should have asked was, “What is Parisian Day giving the customers that my company is not?" The people who had the answer to the ques-tion were the customers themselves. He needed some good, legitimate market research, not an espionage system managed by a washed-out CIA case officer.

Jeffery's real problem was self-deception. He refused to admit to himself that his declining sales and the loss of old customers were signals that he wasn’t meeting the demand of the customers.

The moral of this story is simple: before deciding to spy on someone else, you must first have a very good idea about what information you expect to find, and you should have a clear plan on how you intend to use that information to gain an advantage. Too many people, including many in government, spy on others because they can't figure out what else to do. They begin by deceiving themselves, refusing to recognize their own failures to serve the legitimate needs of their customers or citizens. Instead, they hope to discover an explanation for their personal and insti¬tutional failures in the camp of an enemy.

WHEN A PRIVATE CrnzF.N REC.-KI.ITS 117

 

 


Chapter Eleven

Surveillance

A

 successful spy-recruitment operation begins with

successful surveillance. You should start a surveil-

lance operation as soon as you decide to start spy-

ing on someone else. The question yon need to answer before

beginning surveillance is not how much surveillance should

be done. but. rather, how much budget and manpower can be

committed to surveillance, and how to use them most effec-

tively to gather the most important information.

Because there are numerous good books describing the skills and techniques of surveillance, including several out-standing works in the Paladin catalog, I won’t describe the details of surveillance techniques. Instead, I will focus on what a good intelligence case officer hopes to discover through surveillance. Nevertheless, the reader must under¬stand that surveillance skills, including skills in rhe use of sur¬veillance photography and high-tech listening devices, arc extremely important for every intelligence case officer. Every professional intelligence-collection agency in the world puts its case officer trainees through long hours of rigorous instruc¬tion and practice in surveillance, surveillance avoidance, and Sporting others who arc watching or following the trainee.

The case officer watches the target organization's office

119

 


and everyone who works and visits there to identify employ¬ees and associates of the target. The surveillance must identi¬fy everyone who might be an important parr of the organiza¬tion, especially those who might know the secrets of rhe orga¬nization or have access to those who will know the secrets the case officer wants to steal.

Employees arc easy to identify because they show up to work and leave at rhe end of the day at roughly the same times. Also, they can often be identified as to the type of work they do by what they wear to work. Professionals dress in suits; delivery men. cleaning women, and maintenance peo¬ple dress more casually and may wear uniforms. Once the case officer identifies such people, then the surveillance expands to watching them. The surveillance must discover who they are. where they work, where they live, what they do in their spare time. and. most important, what they do that they want to keep secret. Cars, homes, and recreational activities will also provide considerable data on levels of income and how important each employee is to the target Organization.

The most important goal of the preliminary surveillance IS to identify possible recruits for spying— those who have access to intelligence and who might be conned into spying. Once potential recruits arc identified, the surveillance should look closely at each potential recruit, trying ro learn everything possible about their lives, especially uncovering personal problems or moral weaknesses. This will include evidence thar a potential recruit lives above his income, has difficulty getting along with other people, has family prob¬lems. and any other information that might be used in a recruitment attempt.

LOOK AT WHAT THE SURVEILLANCE

TARGET THROWS AWAY

It’s amazing what some people throw away—canceled checks, old credit card receipts and their carbon copies, empty

120

RUNNING A RING OF SKIES

 


medicine bottles, personal letters, memos and reminder notes, old bills, grocery receipts, shopping lists, lottery and boiling tickets, and sometimes things they never intended to throw away but accidentally dropped into a trash can. You can learn the addresses of friends and business contacts from envelopes, the type of medicine they are taking, all about their personal finances, what kind of legal problems they face, what unions or professional associations they belong to. where their children go to school, what magazines the family reads, how much they drink and $0 on.

Even though the public has been warned repeatedly about the dangers of throwing away such things as credit card charge copies and bank balance sheets, most people keep tossing such things in the trash and then putting out the trash where anyone can pick it up before the garbage collector comes along.

Government intelligence and police agencies understand rhe intelligence value of garbage; therefore, most government agencies with any security concerns burn all their paper trash. Most private citizens, public organizations, and business offices arc notoriously lax about controlling trash that leaves the office and even more careless when it comes to disposing of written material while at home or on the road.

The most serious problems in collecting garbage are avoid-ing being observed while picking up the can and doing it in a way that the subject never realizes that his garbage is being examined by an adversary. A part of the ongoing surveillance should establish the household or office trash routine so that the garbage can be retrieved without being observed between the time it is placed in a Dumpster or set out for pickup and the time It is collected by the garbage truck.

IDENTIFY YOUR TARGET’S ENEMIES

Anyone who is engaged in a dispute of any kind with a tar-get of an intelligence penetration is a potential source of infor¬

SURVEIIJ-ANCE

121

 


mation. Thorough surveillance can identify angry ex-lovers, fired employees, political opponents, business competitors, people owed money by the target, rivals for promotion, and anyone else who might wish harm to the target, his friends, and his employees. Such people will often know a lor about the one they hate and will willingly share rhe dirt with almost anyone who will listen to them.

I -ISTEN TO WHAT YOUR

TARGET IS SAYING

What is your target saying in public and in private conver-sations to which you are privy? If it's a business, read the annual reports and advertising copy. If it’s a political organiza¬tion. read the press releases and listen to what is put On the public record. Go to public meetings or send someone to such meetings. Look ar credit reports, public tax records, docu¬ments required by campaign laws, court records, and every official. Semiofficial, and public document you can lay your hands on.

WHAT WILL YOUR TARGET

TELL YOU IF YOU ASK?

The whole idea behind diplomacy is thar both sides assume that it is a better idea to exchange information than ir is co fight. Obviously, when two hostile parties talk, both sides will be telling lies about their intentions, their strengths, and their tears. Even so, the master of deception must also learn to be a master in recognizing deception in others. Sometimes, people telling lies let slip more truth rhan they realize. (Remember, a good lie must have a lot of truth mixed with it.) If you recognize the lie, then you can guess what truth the lie is trying to cover.

Oftentimes, face-to-facc, nonthreatening confrontations will reveal more about your target than you can learn through

122

RUNNING A RING OF SPIES

 


a sophisticated spy program. This is especially true if you use the techniques of friendly interrogation as described in Chapter 8 when meeting with your enemy in person. Use such a meeting to learn as much about your enemy as you can while revealing only those things about yourself that will strengthen your position with the enemy.

IF POSSIBLE. GET AN INVITATION

TO THE TARGETS HOME

This is often easier than you would suppose, provided rhe intelligence officer or one of his agents is not known to the target. You might pretend to be a repairman, salesman, private investigator collecting information on a neighbor, volunteer for a charity soliciting donations, or even a policeman or fire¬man offering a free safety inspection.

Once inside a home, always have a sudden nature call. Its surprising how much you can learn about someone by gaining access to the bathroom and the medicine cabinet.

This is best demonstrated by a recent scam in which a tent preacher, who claimed he could heal the sick, would spy on believers who had written letters requesting free front scat tickets to one of his healing revivals. A few days before the revival, a well-dressed young woman driving a new model car would fake a mechanical breakdown in front of the target’s home. The young woman would attempt to fix the car by working under the hood for a bit, making sure she got some dirt and grime on her hands. Then, acting frustrated and angry; she would ring (he bell of rhe target’s house and ask to use rhe phone, explaining that she was supposed to be at an important meeting and that she needed to call the people expecting her and then call an auio club. Once the calls were made, she asked if she could use the bathroom to wash the grease and grime off her hands.

In the bathroom, she would open the medicine cabinet. What she learned would be pul (0 good use at the next revival

SURX EI1XANCE

123

 


meeting. On the night of the next revival, the preacher walked through rhe audience, proclaiming chat God—through him, of course—was looking for someone co bless with a heal¬ing: *'I sec a woman named Evelyn who is chained to Valium. Dr. Bemhearr wrires her the prescription because he can't heal her like God can. rhe expensive vitamins that Evelyn buys from the Nature’s Way Vitamin Company won’t do it either. The double-strength aspirin she buys in rhe 200-tablet bottles helps rhe pain for only a while, but God wants to help her for eternity.”

Evelyn, convinced that the preacher had a direct line to the Almighty didn’t think about the pretry young lady who asked to use the phone several days earlier as the preacher suddenly turned, looked ar her, and asked, **Your name is Evelyn, isn’t it?”

Once you know everything that can be learned through surveillance about rhe target and those who work for him or have some personal relationship with him, you are ready to start recruiting people to spy on the target.

124

RUNNING A RING OK SKIES

 


Chapter Twelve

rhe Basic Steps:

Phase One

A I A here are seven basic steps in rhe recruitment and running of a covert spy, divided into (WO phases.

JL The first three steps make up phase one. which we'll discuss in this chapter. The remaining four steps, phase two, will be detailed in Chapter 13.

Phase One

Spotting

Evaluation

Recruiting

Phase Two

Testing

Training

Handling

Termination

SIGHTING

The major products of gtxxl surveillance will be a list of potential recruits for spying.

There arc two primary criteria that must be considered in

125

 


identifying a potential recruit. The first criteria is that of access: docs the potential recruit have access to the informa¬tion the intelligence collector wants to steal? Potential recruits should be rated in order of the probability that they will have access to secret intelligence or have a personal relation with someone who has access.

The second criteria is personality assessment: is the potential recruit someone who can be subverted?

Anyone looking for a good spy should focus on rhe fol-lowing classes of employees in the target organization:

Angry or desperate upper- and mid level management person¬nel. These arc the people who have lost the trust of their colleagues or have personal secrets that would lose them such trust if their secrets were discovered. Stuck on the career ladder because of their own incompetence, they fear that they arc going to lose their jobs and arc looking for both sympathy and someone ro blame for their fail¬ure to succeed. The best prospects are those who have been recently passed over for promotion. They will be angry’ and may be looking for possible revenge, a way out of the dilemma, or some way to remake their world into something more to their liking.

Clerks, secretaries, and communications personnel. These peo¬ple SCO lots of secret information. Although most such employees are surprisingly loyal to their bosses—despite their low position on rhe pay scale—many have personal problems and vices that make them potential subjects for recruiting. They may have tastes they can’t afford to feed, and they are envious of those who can afford such luxuries, especially among their higher-paid colleagues.

Janitors, driven. cleaning ladies, and other uỉiKÌsibk” people Underpaid and often ignored or even mistreated, these work-ers always need more money for the simplest things. Many of them have more access to secret information, or can ger access, than the movers and shakers in rhe organization ever imagine.

126

Rt NMNG A RING OF SPIES

 


The best potential spies for combining both criteria arc rhe unglamorous and sometimes ugly people who in their often dull and always routine jobs have access to secrets.

Other especially good prospects are antisocial personali¬ties incapable of loyalty to anything. These types of people arc also the most likely to have secret vices. They may gam¬ble when they don't have money to cover the losses, drink too much, use illegal drugs, engage in high-risk sexual behavior, and have domestic problems. Most important, they arc look¬ing for easy ways out of their troubles.

Unfortunately, life is no more fair for the intelligence case officer than it is for anyone else, and the best is nor what you usually get- Instead of identifying the perfect recruit, most case officers find themselves with a list of potential recruits, none of whom come close to marching what the case officer hopes to find. The person with the best access to the infor¬mation will be a recently promoted, contented worker, who is happily married with great kids, no serious vices, and a high¬ly developed sense of loyalty.

Often, the initial surveillance will discover no one who might have access to valuable information and who fits the personality profile of a potential spy. Compromises must then be made, and the experienced case officer will usually choose the person with rhe personality traits that make him an easier target for recruitment over the person who has better access to information. It is better ro have a less-rhan-adequate spy than no spy at all.

In such situations rhe case officer will have to settle for an initial recruitment of an access agent, someone who has direct access to others who may eventually prove to have potential as a primary agent. At the very least, a good access agent can provide the access necessary to plant electronic bugs, cake pictures of physical plants, or report on officer gossip.

THE BASIC STEPS: PHASE ONE 127

 


EVALUATION

Once che case officer has identified potential recruits, each one must be thoroughly evaluated in order ro identify the possi-ble motives for why the target would he induced co turn traitor and to determine what type of approach will most likely succeed. The case officer must then decide who will make the initial approach, what cover story rhe recruiting case officer will use, what enticements will be offered to cement their friendship and create anticipation for more rewards, and how the recruit will be managed through chc recruitment process.

The case officer must also decide if he will attempt to use rhe target as an unintentional spy. or if the recruit will be manipulated into a position where he voluntarily agrees to spy, perhaps as a favor to his new friend or because rhe friend offers co solve the target's personal problems.

RECRUITING

The basic formula 3 case officer uses for recruiting a spy is a simple one.

The case officer, or someone controlled by the case officer, pretends ro be someone the target would respect, desire, admire, or perhaps even fear..

T he recruiter arranges to meet and get to know the target.

Once acquainted, the recruiter develops a close personal rela¬tionship with lire target based on one or more of the bonds of friendship, such as sexual attraction, common interests, sim¬ilar personalities, common political objectives, or mutual hates, and offers to help solve personal problems.

The recruiter builds the relationship into one in w hich rhe target trusts the recruiter and looks to him for advice and help in solving personal problems. At the same lime, the recruiter will subtly encourage and support the behavior that creates those personal problems.

128 RUNNING A RING or SPIES

 


The recruiter asks rhe target to do innocent favors and ser-vices and rewards the target with praise, money, sex, drugs, psychological support, or a combination of those things-

Taking advantage of the grow ing trust and dependence of the target, the recruiter asks the target to provide unim¬portant bits of information about the organization targeted for intelligence collection. The recruiter treats such harm¬less bits of knowledge as more important than they really are and rewards the target for his service.

As the target responds in a positive manner, the rccmiter makes additional requests that step progressively closer to treason. The recruiter increases rhe rewards given to the point that the target comes to expect and, perhaps, becomes dependent on them. Ar the same time, the recruiter helps the target to find psychological justification for betraying those who trust him.

The recruiter takes the final step, asking the target to pro¬vide important information that will be a clear betrayal of his earlier loyalties to his government, employer, trusted confederates, or lover.

Choosing the Recruiter

The case officer may either handle the initial contact him¬self or use a surrogate he controls. A surrogate recruiter can be an access agent, some third party who doesn't realize he is being used, or another case officer picked because he has the specific personality traits needed. It is also possible that a case officer from a different territory will be brought in to handle the recruitment in case the operation rums sour. In such an event, the recruiting officer can go home after the failure, and the primary case officer can look for another recruit, without having to fear exposure by the target of the failed attempt.

If another professional case officer is used, he should be fully informed about rhe reasons for recruitment and what the operations officer expects to get from the recruit. On the other hand, an access agenr may know little or nothing about why

THE BASK: STEPS: PHASE ONE 129

 


the target is being recruited or. for that matter, who will real¬ly benefit from the spying.

Preferably, such an access agent will not know who he is really working for. For example, a case officer may hire 3 pros-titute who approaches a potential recruit known to be ripe for a love experience. The ease officer tells the prostitute that the target is a business customer he wants to get relaxed and ready to deal with when, in fact, the case officer is a KGB agent who wants to set up the target for a blackmail recruit¬ment. The prostitute, al the insưuction of the case officer, may then pretend to be a college student looking for work or a recently divorced woman looking for love when she meets the target for the first lime.

Once the access agent gers to know the target and earns his love or trust, he will lead the target into an inưoduction with the case officer, who will then take over direct control of rhe target. For example, the prostitute might first develop a romantic relationship with the target and then introduce the target to rhe case officer at a social function as an old friend or relative. In other situations, the access agent or the contact case officer may introduce the primary case officer to the tar¬get during a chance meeting in a restaurant, on a golf course. 3t church, or in a bar.

It may be impossible to make direct contact with the best potential recruit. Perhaps he never goes out in public, or he hides behind a secretary who screens all his appointments and is extremely suspicious of any approach by a stranger who has not been properly introduced. In such a case, the case officer may enlist rhe help of an innocent third parry who is close to the target, perhaps 3 relative, an old friend, a business associ¬ate, or even his wife or child- The case officer first makes friends with the associate or family member, and then when he gains that person's trust, he manipulates the unwitting accomplice into introducing the target to him.

Whether he makes rhe initial contact or uses 3 surrogate, the case officer arranges 3 meeting with the potential recruit that

130 RUNNING A RING OF SPIES

 


appears to be a normal occurrence in rhe daily life of the recruit. In most cases. it should take place in a nonthreatening social sit-uation, preferably when the potential recruit is relaxing away from the office. The target might be approached while on vaca-tion. at church, or perhaps traveling in a foreign country.

Government agencies ofren approach a target while he is traveling abroad. Indeed, if he lives in a repressive country in which the government regularly spies on its citizens, recruit¬ment in a foreign country may be the only possibility. The Mossad almost never stations case agents inside Arab coun¬tries. Instead, they focus their recruitment efforts on Arabs who travel abroad.

The. idea is to set up a social situation in which the taigct remembers the meetingas one in which ht rook the initiative. It IS best if a situation is designed so that the target approach¬es the recruiter and introduces himself.

In one counterespionage operation targeted against an intelligence officer working in the Soviet Embassy, an FBI recruiting team began attending meetings of a technical soci¬ety where the suspected Soviet case officer often hung out. One of rhe members of the FBI team always arrived alone and remained aloof from the other participants during the meet¬ings, but occasionally asked probing questions that suggested (hat he was a highly qualified technical expert. The Soviet Embassy case officer, obviously curious, started asking other guests at the meeting about the stranger, but no one seemed to know’ anything about him. Eventually, the Soviet agent asked one member of the FBI recruitment team, who told the •Soviet a cover story that identified the stranger as a scientist working fora government contractor in the missile industry— an obvious target for Soviet recruitment.

Soon, the Soviet agent approached the planted FBI agent, who artfully managed ro turn the tables and recruit the Soviet to spy for the FBI. What started out as an attempt ar recruit¬ing an American to spy for the Soviets ended up in the suc¬cessful recruitment of a Soviet intelligence office, who pro¬

THE BASK; STEPS: PHASE ONE 131

 


vided extremely valuable information for several years. (This particular spy became one of the first victims after Rick Aines Started spying for the KGB. Ames exposed the man to the KGB. and he was then suddenly transferred back to the Soviet Union, arrested, and eventually executed.)

In some circumstances rhe intelligence ream might want to create a situation in which the urge:, or a lover or family member of the target, is placed in danger, then (he recruiter appears on the scene and rescues the target. Two support agents might attack a potential recruit on a dark street. As she is about to be raped, a passing motorist stops and scares the rapists away. The rescuer, pretending to be a good Samaritan, then takes the woman to a police station or wherever she wants to go.

Instead of being the primary target, the woman might be the daughter of rhe primary target. The heroic case officer then accepts an invitation to meet with the father who wants to extend his thanks.

Another ploy is to arrange a minor traffic accident that allows the opportunity to exchange names and addresses. The recruiter doesn’t have to be in the other car; he could be the witness who got a description and license number of a hit- and-run driver.

The plot for such threatening situations might be rewrit¬ten so that it is the recruiter who appears to he in danger and rhe potential recruit saves the day. This works especially well if the initial contact agent is a pretty woman and the potential recruit scares off rhe criminals who arc dragging her into an alley or arc running away with her purse.

Ina previous chapter we saw how a case agent first set up a love match, put the love in danger, and then introduced himself to the target, offering a solution that saved the girl and protected (he target from exposure.

Wherever rhe initial approach is made, it should be a sit-uation in which the case officer has control and can retreat quickly if something goes wrong. Although rhe recruiting

132

RUNNING A KING OF SPIES

 


operation should be carefully planned out in detail, the ease officer must be ready to flow with the events and situations and be prepared to take advantage of sudden opportunities.

Throughout the recruitment process, intelligence officers should intensify rhe surveillance of the prospect. All meetings between the recruiter and subject should be monitored by 3 surveillance team. If possible, both sound and videotape recordings should be made. The intelligence team should gather any evidence that might be used to incriminate the subject—fingerprints, photos, tape recordings, and eyewit¬nesses—in the event rhe recruitment effort fails.

Once rhe target meets the ease officer, the latter, who will almost always pretend to be something he is not, begins to build a nonthreatening friendship with the target. At the same time, everything the ease officer says or does must be designed to put the target at ease and make him or her enjoy the new friendship: the case officer should do nothing that puts the target offguard about rhe possible dangers of such a friendship.

'1110 ease officer must do whatever is necessary to become a trusted friend on whom the prospective recruit believes he can rely. To do this, the case officer will do the following;

Listen to the target talk

Sympathize with the target’s problems

Offer easy solutions to the target's problems and lend a helping hand in solving such problems

Feed the target’s prejudices and play to his vanity, fears, and hopes

Grant the target absolution (no matter what terrible things he admits to having done)

Ask the target for simple favors and be grateful w hen they arc granted but gracious when the target cannot help

Never criticize w hat the larger holds dear

As rhe friendship develops, rhe case officer or his con¬trolled surrogate leads the target into spying by making it

THE B ASK : STEPS: Fl 1ASE ONE 133

 


appear to be a natural outcome of the friendship. Often, rhe clever case officer will create a situation in which information becomes a commodity rhe target can use to help solve 3 prob- lem faced by the target or the case officer himself.

The first request for information will be for something thar appears to be harmless and perhaps even legitimate. It may be something as simple as a request for a company tele¬phone book, training manual, or list of salesmen or company employees. The next step toward treason will be a request for something a bit more sensitive, but this time it will be accom¬panied by an offer of some kind of reward.

Gradually, the new friend leads rhe target into increasing¬ly illegal and immoral behavior, all the while making it appear that rhe traitorous acts arc further cementing the friendship or love alTair. The inducement to treason may be psychological motivation, sex, money, or a combination of all three.

In some situations, the case officer may arrange secretly to create pioblems that threaten the targets peace of mind, employment, marriage, or even his life or the life of someone he loves. For example, a case officer may use an access agent to plant evidence that will get the target in trouble with his boss or the law. The case officer then sympathizes with the aggrieved employee or loyal citizen while subtly suggesting that the target owes no real loyalty to such an unfair employ¬er or government.

If blackmail is used as an inducement to treason, the case officer will usually not be the one making rhe blackmail threat. A crude entrapment followed by blackmail threats from rhe case officer can easily backfire, and if it docs, the case officer will have to withdraw and the recruitment effort abandoned. A clever case officer will arrange for someone else to make the blackmail approach, and then he will offer a way to get out of the blackmail situation or collect the funds nec¬essary to pay the blackmail demands. The recruiter may even pretend to be another victim of the same blackmailer. This was the method used in the following example.

13-1 RUNNING A RING OF SPIES

 


The Manila Blackmail Recruitment

The target of this recruitment operation, Car! Larson, was in Manila on a business trip when he overheard two Americans talking in a hotel bar about their home town of San José. California. Carl interrupted and introduced himself as someone who called San José home, coo. The two men asked Carl to join (hem for a drink and introduced themselves as Bob French and Bill Lee.

Bob told Carl that he and Bill had just met and joked about what a long way the three had come ro meet a couple of neigh-bors. The three men exchanged business cards, had a few more drinks, and then Bill, who had bragged about his frequent trav¬el co the Philippines, suggested rhat he take rhe other two men on a tour of the infamous Manila night life.

After numerous drinks and stops at a half-dozen different girly bars featuring full nudity, the three men took three Filipino women they had met along rhe way to a short-time hotel rhat Bill recommended. There, the three men split com¬pany. and each took his date to a separate room.

The next morning, Carl woke up with a terrible hangover and a heavy load of guilt, compounded by the fear that the woman, who didn’t look all that pretty or young in the morn¬ing light, might have given him something he didn’t want to rake home to his wife. Car! paid the lady and then took a taxi back to his hotel with a quick stop at a pharmacy where he bought enough antibiotics to ensure that he wouldn't come down w ith any of the less deadly diseases of love. He saw nei¬ther Bob nor Bill during the remainder of his stay in Manila.

Three weeks later, when he was back home in San José. Carl opened an envelope delivered by a messenger and dis-covered a videotaped recording of his activities with the Filipino prostitute. The accompanying note made the usual blackmail threats about sending copies to his wife, the press, and his employer unless Carl paid $50,000. There were also instructions for making the payment to a numbered bank account in Panama.

THE BASIC STEFS: PHASE ONE 135

 


As Carl sat there, stunned and frightened, he received an angry phone call from Bob French, who accused Carl of set¬ting him up for blackmail. French Fold Carl rhac because he was a bachelor and the owner of his own consulting company, he was blackmail proof. He not only refused to pay the black¬mail. he threatened to go after both Carl and Bill Lee. who French was sure must have conspired to blackmail him. Carl, by now almost hysterical, vehemently denied rhe accusation and cold Bob he was also being blackmailed—and that he wasn't blackmail-proof. Bob, cooling down, suggested chat the two of them get together to discuss what to do next.

When they met, Bob starred off by apologizing for accus¬ing Carl of setting up the blackmail operation. I le reported that since rhe morning conversation, he had tried to call Bill, but the number and address listed on Bill’s business card were phony. Obviously, it had been Bill who set up both of them. Whereas Carl, who didifl have $50,000 in available cash, was terrified. Bob, although angry, apparently was nor worried about himself. Bob pointed out that even if Carl found the money and paid it. that would just be the first installment. Going to rhe police wouldn't do any good cither, because Bill was operating out of a foreign country.

Bob wanted to put the blackmailer out of business, per-manently, and suggested that was Carl’s best hope as well, provided that in the process they could get hold of the black¬mail material. He told Carl he had some Philippine contacts he thought could do it for him. but he didn't want to make a move unless he knew that he had Carl’s support. When Carl asked what that would cost. Bob told him nor to worry, that his friends owed him a favor and that he felt partially responsible for Carl’s problems because he hadn't sported Bill for the blackmailer he was. Bob suggested that Carl keep his month shut and not pay any blackmail for the rime being. ITie lunger they discussed the action, the more Bob made it sound like he was going to solve the problem more as a favor to Carl than because of any concern about himself.

136

Ri INNING A RING OF SPIES

 


A week later during which time Carl received rwo more letters demanding immediate payment. Boh called and sug-gested that the two of them meet for lunch. As soon as they had ordered the drinks, Bob explained that his contacts in Manila had found Bill’s place of operation as well as evidence that he regularly enticed visiting Americans into blackmail situations. They also had learned that Lee kepr his blackmail evidence in a safe in a small apartment where he lived in Manila. Bob’s friends had it set up with a crooked Filipino police colonel to break into the apartment, open die safe, collect (he evidence, and (hen ’’put Bill out of business, permanently.”

There was just one hitch: the payoff to the police colonel for his help (to ensure (hat no one who engaged in the break- in would be caught and arrested) was going to cost more chan either Bob or his friends had expected. Bobs friends in Manila had proposed a deal. They wanted a complete report on Carl’s business activities during his visit to Manila, whom he met. what deals were arranged, and what kinds of profits Carl’s company expected to make in Manila.

When Carl asked. Bob admitted that the information would go to 3 European competitor who wanted to make the deal with (he Filipino corporation that Carl had been wooing. Bob added that his own opinion was that rhe competitor would get the deal anyway and that the Filipino firm had been stringing Carls company along to use 3S leverage to get a better deal out of the European company.

In fact, Carl’s trip to Manila had been a business bust. The proposed partner for the Filipino-American venture wanted too big a share of (he stock. and unless (he Filipino changed his mind and lowered hi$ demands, there would be no deal, even without another competitor bidding for the business. Because Carl didn't want to go back to Manila ever again, he could have cared less if his company lost rhe market in the Philippines. He quickly agreed to do what Bob asked. A day later he gave Bob all the information he had requested.

A week later, Bob met with Carl again and handed him a

THE BASIC STEPS: PHASE ONE 137

 


package containing rhe original negatives and videotape of Carls Manila night. Bob also assured Carl char he didn't have co worry about Bill, who had ’’disappeared.”

Bob had another surprise for Carl. His friends in Manila had found the information that Carl had provided so useful chat they were paying a bonus. Bob then handed Carl an envelope containing SI.000. I le asked that Carl sign a receipt for the money so Bob could prove to his friends that he had passed it on to the intended party. Boh assured Carl that no further record would be made of the transaction and that he could consider the money tax-free income rhar neither Carls employer nor rhe IRS would ever know about

As soon as he signed that receipt, Carl was hooked. The next rime. Bob asked for a bit of commercial intelligence on Carls company’s plans for a pending deal in Singapore. Carl made $1,500, exactly what he needed lo pay for the unex¬pected orthodontic work his daughter required. During rhe next several years, Carl passed increasingly sensitive intelli¬gence about his company’s overseas deals on to the man he knew as Bob French.

Bob and Bill had worked together in setting up the recruitment that entrapped Carl into becoming a corporate spy. Bill’s disappearance wasn’t murder; he just dropped the fake identity he'd used for one operation.

When the Case Officer Can

Openly Blackmail ứie Recruit

Although rhe case officer is usually not the one who actually blackmails the recruit during the initial process, once the recruit is working as a spy, the case officer may use blackmail, if necessary, to keep the spy in line. The case officer should always collect rhe necessary evidence that he can use to blackmail a recruit w ho decides he doesn’t want to Spy any longer.

In the previous example, for as long a^ Bob controlled Carl, he kept in a safe his own copies of rhe photos and tapes of

1S8 RUNNING A RING OF SPIES

 


Carl’s night on the town along with the growing pile of receipts for the money he paid Carl for company secrets. But he never had to use that material to conưol Carl.

Creativity Is Always the Order of the Day

There are an infinite number of ways in which a case offi-cer can deceive a target into Turning traitor. The best method is one specifically designed to fit the emotional, psychologi¬cal, and monetary needs of rhe Target while subtly offering the target a justification for what he is going to do—steal informa-tion and give it co the new friend, who has suddenly become an important part of his life.

Sometimes, honesty—or better said, $ộwư honesty—is the best policy in a recruitment effort. If surveillance and investi-gation uncover That a potential recruit is already angry at his boss, he might jump at the chance to do a little spying for rhe competition, especially if he can make money doing it. Intelligence experts who engage in commercial espionage are always on the lookout for disgruntled employees who are looking for new employment.

In such a case, the direct approach, in which the case offi-cer offers borh immediate rewards and the possibility of future employment, may be the easiest, quickest route ro recruitment. That's why the cold pitch described in Chapter 9 to recruit Silvestro Martinez worked. Martinez was in a career bind and he knew it, and he also knew that the only intelligence agency that would be interested in the informa¬tion he had to sell was the CIA. When you have a porenrial recruit who will jump at the chance to work for the CIA. IRS, or FBI. Of a business competitor who wants co put a recruit's mean boss out of business, a false flag is not only unnecessary, it may actually ger in the way of recruitment.

However, even in those cases ill which the case officer honestly admits whar organization or agency he represents, some deception is still in order. The smart Case officer will not use his real identity or give the recruit any information that

THE BASIC STEPS: PHASE ONE 139

 


would allow rhe recruit to identify him or learn anything about his personal life. It's always possible that the potential spy who appears so anxious to start spying for the case officer is. in fact, rhe bait set as a trap. Its also possible that the potential recruit will suddenly change his mind. In any ease, the less that the recruit knows about the real person doing the recruiting, the better.

When lire Recruitment Fails

There arc no guarantees in life, and even the best-hid plans sometimes end disastrously. The recruit may recognize what is happening and immediately react to protect himself and those to whom he owes his loyalty. The target may break off contact, or he may go ro his security officer, counterintelli¬gence people, or the police. The worst-case scenario is one in which he continues ro lead the recruiting case officer on, either to entrap him or to feed him false information.

The possibility that the target will be doubled in an attempt to spread disinformation is the reason why close sur¬veillance of the target should continue throughout rhe recruit¬ment effort. If the potential recruit starts meeting secretly with other people, the recruiting officer must be among the first to know.

Failed, aborted* and doubled recruitments always pose a serious threat to the intelligence agency, rhe private intelli¬gence case officer, or rhe private citizen who initiates an espi¬onage operation. Therefore, recruitment plans must always include procedures to follow in the event of failure or even betrayal. *rhc espionage officer must assume that the subject who rejects a recruitment attempt will report rhe attempt to his government, employer, or agency.

As sonn as there is good reason (O believe that the attempt at recruitment has failed, or will fail, the case officer and any others engaged in the recruitment must break off all contact with the subject. Any contact points, such as office phone numbers or safe houses, must be shut down. The target must

HO

RVNNING A RING OF SPIES

 


have no way to contact anyone associated with rhe recruit¬ment once the recruitment effort is abandoned. This is why it is so important to use a false identity when recruiting, even when the recruiter is honest about w hat government or orga¬nization rhe spy will be serving. Those responsible for espi¬onage activity must be able to make a credible denial if the target goes public or attempts to make a criminal charge.

If future attempts arc made to recruit new subjects in the same larger organization, the case officer must assume the tar-get officers will be warned. The same false flag or cover story should not be used, and the same case officer should not arrempt to contact another potential source in that target orga-nization. This is why the (JIA and other spy agencies often temporarily bring in a case officer assigned in another country for some extra duty whenever they initiate a recruitment. If the recruitment fails. rhe exposed case officer can immediate¬ly leave rhe country, and there will be no chance that the sour recruit will bump into the failed recruiter accidentally while walking through a shopping mall.

A clever recruitment effort using a false flag may cause the enemy problems even when it fails by spreading misin-formation. Say, for example, a KGB case officer pretends to be an American interested in a relationship in order to recruit a young but homely woman working in a French atomic weapons production facility. When the woman s new lover starts asking questions about weapon production, she goes to her security’ officer like she is supposed to. The French coun¬terintelligence agency attempts to trap the case officer, but he spots rhe tail on the larger recruit and disappears forever. The Trench government then commits a great deal of time and effnrr trying to discover why the Americans arc recruiting spies within the French nuclear production industry.

In a similar example from the world of private espionage, a case officer working for a large corporation attempted to recruit a spy inside a competitors bookkeeping department by claiming to be working for (he IRS and offering a sizable

THE BASIC STEPS: PHASE OXE 141

 


reward for the information he wanted the target ro steal. The honest employee instead told his boss about the attempt to recruit him. The boss was no longer such a threatening com-petitor because he was worried TOO much about a possible government investigation into his financial affairs.

Whenever abandoning a recruiting effort, rhe ease officer should do everything possible to embarrass or discredit the uncooperative target. He should expose any blackmail mater¬ial. tell the failed recruit's wife about the girlfriend, anony¬mously report crimes to local police, and so on. The more trouble the failed recruit suddenly discovers in his life, the less likely he will he to spend time and effort trying to identi¬fy the man or woman w ho tried ro turn him into a spy. If a case officer can’t recruit an enemy’s loyal employee to spy for him. he can make sure that the employee isn’t the happy worker he once was.

142

RUNNING A RING OF SPIES

 


Chapter Thirteen

The Basic Steps:

Phase Two

E

very new spy must he tested as soon as he starts

passing intelligence to the case officer to make sure

that the spy is delivering reliable information.

TESTING THE RECRUIT

The testing will continue for as long as the recruited spy provides intelligence information. The best way to test rhe new spy's reliability is to check his information against known facts. To do this, the case officer tasks the spy with finding out specific information without letting him know that the case officer already has that information.

For example, the CIA may already have identified a mis¬sile site by surveillance photography. So the case officer asks the new spy to steal a list of missile sites and then checks to make sure the known site is on the list provided by the spy. If what the spy provides doesn’t jibe with what the case officer knows to be true, the new agent may be a liar, a plant, or just a poor source of information. Regardless of rhe reason for his inaccuracy, he is not credible, and if the situation cannot be corrected through threats or the termination of promised rewards, the spy should be dropped as a source.

143

 


Although stolen information can almost always be veri¬fied during the early .service of rhe recruited spy; as the spy provides more sensitive and unique information, it will be more difficult to test information provided by rhe agent against other reliable sources.

If possible, any espionage Operation should recruit more rhan one spy inside the target organization. By operating a ring of spies, rhe case officer can check each spy $ information against the information provided by other spies. Each spy should have no clue about which of his colleagues is also spy¬ing for the enemy. It s best ro recruit different spies under dif¬ferent false flags using different case officers as the control for each spy.

Eventually, the best and most useful spy may be provid¬ing intelligence information that IS not available from any Other source. This is rhe very reason why someone sets out to recniir a spy to learn something rhar cannot be learned any Other way. On the other hand, Such single source information can be extremely dangerous if it’s misinformation.

Sometimes the information can be easily verified by the results. For example, the spy reports that the enemy will attack Cartagena on Tuesday, and the enemy docs just that. However, careful records must be kept of all information pro¬vided by rhe spy, and these must be checked against future events and other sources of information.

A rigorous scientific method must be followed in checking on rhe veracity of the information provided. If the informarion is indeed ưue, then all predictions of future events based on the stolen information will prove true. Even one prediction based on an agents information that doesn’t check out must raise serious doubts about the reliability of the agent. However, sometimes false predictions can he explained: “The prime minister changed his mind ar the last minute and canceled the attack on Canagcna because he discovered that the enemy had been alerted to the attack.” Often, when an intelligence report proves false, the excuses offered by rhe

1H

RiNNiNG A RING OF SPIES

 


spy can be checked out. If rhe explanation cannot he verified, the intelligence operations officer must exercise even greater care in testing future information the agent provides.

In all intelligence “Collection efforts that rely on recruited spies, lying is a constant consideration. In one case in the 1950s, the CIA paid millions of dollars to a Chinese agent who claimed he was running a netw ork of spies char he had recruit¬ed inside China. 11c claimed his agents were reporting on social conditions, anti-government activities, and economic developments. The agents inside China supposedly delivered their reports to the U.S. agent by secret correspondence and radio transmissions.

In fact, the self-described private intelligence entrepre¬neur was lying. He based his reports on newspaper stories, public government documents, and propaganda broadcasts, all of which he collected outside mainland China. He had no ring of spies, no clandestine radio net, and no sources inside the People s Republic of China.

Because he was using many of the same sources that the CIA was—interception of radio and TV news programs and newspaper clipping services—rhe bogus spy’s information generally tracked with what the CIA analysts already knew about Red China. By (he rime the CIA discovered the nature of the information, the agency faced a massive task in clean¬ing out the thousands of flics based on the faked information provided by the bogus spy. The “spy” disappeared—along with the millions he had collected—and was never heard from again. Even worse, there is good evidence that rhe spy was working for rhe Republic of China in Taiwan: that is, he was telling U.S. intelligence what die Nationalist Chinese wanted the Americans to believe.

The fact that some information does check out is nor irrefutable evidence that rhe source is reliable. Disinforma¬tion operations, such as when a spy is doubled and then used to pass false information to an enemy, always include factual information as a cover for the misinformation.

THE BASK: STEPS: PHASE TWO 14S

 


The three must dangerous mistakes an intelligence officer can make arc as follows:

To continue to accept unverified intelligence provided by a recruited spy after a piece of information has been proven false. C1T1ÍS is especially dangerous if previous information from the source made the intelligence officer look good with his superiors.)

To refuse co accept information provided by a reliable agent—one whose previous information has always checked nur—because the new information doesn’t fit rhe officer’s beliefs about what rhe enemy is doing or planning.

To pressure the spy to provide intelligence that will verify the officer s unsubstantiated conclusions, which will likely just rempt the spy to create false intelligence ro keep the payments coming in. (The worst sin a case officer can com-mit is to offer a spy a bonus if he produces intelligence confirming his own favorite theory. Never give a spy a rea-son to lie to keep the case officer happy.)

The whole purpose of spying is to learn information that changes our understanding of what the enemy is planning and will likely do.

WHEN INDEPENDENT

VERIFICATION ISN’T POSSIBLE

All too often, it’s impossible to verify information inde-pendently before deciding what action to take based on chat information. Sometimes intelligence collection evolves to the point that there is no way co verify a report, but if that infor-mation is acted upon, and it proves true, victory is guaran¬teed;. but if it proves false, disaster ensues. This dilemma is why so many intelligence agencies have turned to the poly¬graph examination as a way of testing recruited spies.

146

RUNNING A RING OF SPIES

 


Fluttering die Recruit

The CIA and other government spy agencies often include the polygraph as one part of their testing process. The recruit will usually only submit to a polygraph examination after the recruiting process is completed and he realizes that he is indeed spying on his own government, employer, or friends. Once he realizes his predicament, however, the spy usually has no choice other than agreeing to be fluttered, pro¬vided rhe case officer Can arrange a way to set it up. (The spy who is being paid to supply secrets and refuses to he fluttered is most likely lying.)

Some polygraph experts, the honest ones, will admit that the polygraph is really a psychological tool rather than a machine that measures truth. Anyone w ho understands w hat a polygraph will or will not do can often beat the machine. It doesn’t work much better than a coin flip as a he detector for many people, including those who have the most experience telling lies. When the machine docs work, it works as often as not because the subject doesn’t dare tell a he our of fear that the machine will catch him.

There arc several books that describe techniques on how to bear rhe machine, and many intelligence agencies instruct their employees and sometimes even their agents on these tech¬niques. Rick Ames passed two polygraph tests while he was making millions of dollars selling out U.S. spies to the KGB.

Polygraph examinations are expensive; they require tiaincd personnel, and the recruit must go to some secret loca¬tion. such as a safe house, or even take a trip to another coun¬try so he can be fluttered. Even so, if the case officer has the means of fluttering a recruit. It is worthwhile doing so. as long as the case officer understands that the polygraph examina¬tion is one part of the drama of recruiting and evaluating the source, a scenario designed to make the recruit believe that his lies will be discovered and he will be punished.

This drama can affect a recruit so much that a private intelligence operator may want to arrange 3 fake polygraph

THF BASK: STEPS: PHASE TWO

147

 


examination if he doesn't have the budget and trained per¬sonnel for the real thing. Most people have never seen a poly¬graph machine, so it’s a simple exercise TO set up something that looks like 3 polygraph session does on television, hook up (he subject, and let someone ask him a bunch of questions. In such a con it is surprising how often the subject will tell (he truth because he thinks he can't lie without getting caught, or he will get so nervous that an interrogator wonk need a lie detector to spot the lies he tells.

What (he intelligence officer should never do IS accept the word of the recruit based on the Supposed results of a poly¬graph examination. The truth can only be determined by examining whether rhe information provided proves true. If not. (hen the recruit was lying or someone lied to him. no mat¬ter what the machine rold (he polygraph examiner.

Verification by Friendly Interrogation

Intelligence officers who understand rhe fallacy of depending on the polygraph rely more on the techniques of friendly interrogation co test their recruits. Each rime a ease officer meets with a recruit in a situation (hat permits a frank exchange of information, he interrogates the recruit in great detail about his collection of intelligence information.

When a friendly interrogation is done right, the subject may not even realize that he is being interrogated, hut instead conclude that the conversation demonstrates the case officer s interest in and concern about rhe subject's daily activities and the risks he is taking by spying.

A good source-verification interrogation will take several hours (Of even several days), with the case officer (or better, a trained interrogation officer) encouraging the recruit to talk about anything and every thing dealing with his daily life and his spy activities.

If ar all possible, (he entire conversation should be record¬ed without the spy’s knowledge. Its even better if the inter¬view can be secretly videotaped, rhe more detail rhe recruit

148 RUNNING A RING CM- SPIES

 


provides in answering questions, rhe better. The case officer wants co learn such things as to whom the recruit has been talking, the dates and time of day such meetings cook place, where rhe meetings took place, who else attended, and what they ate. Every question should be asked in several different wavs, bur they should interspersed throughout the dialogue and not be sequential.

After such an interrogation, the case officer, rhe interroga-tor, and the support intelligence staff must go over (he entire conversation, word for word, looking for possible contradic-tions and making specific comparisons with the answers to the same question asked in different ways.

Telling lies is a lot harder than telling the truth, and only the cleverest of deceivers can remember all the details neces¬sary to make a lie hold together over a long interrogation. Most liars don’t plan a story thoroughly, so they must create the details on the fly. which makes it even harder to remember the little lie they roid two days ago. Most often it will be the little details that alert the case officer that the recruit is lying.

Perhaps the recruit describes a visit co a nuclear plant, and when asked a question about rhe weather, he reports it was a sunny day. When the case officer checks a weather report, he discovers that (he day was heavily overcast Maybe the recruit mentions that one of his sources was drinking a martini dur¬ing one meeting. When (he friendly interrogator asks several hours later what drinks were served at the meeting, die recruit who has already forgotten what he said earlier, reports that everyone was drinking scotch.

Give a suspected liar a chance to talk, act as if you believe every word he says, and ask lots of questions. Sooner or later the liar will trip himself lip.

TRAINING THE RECRUIT

Every recruit will eventually require some training in the craft of spying—such things as the use of miniature and spe¬

THE BASK; STEPS: PHASE IV O

149

 


cialized cameras, coded writing, computer encryption pro¬grams. radio transmissions, surveillance-detection techniques, dead drops, and escape and evasion tactics. How much train¬ing is necessary will depend on the sophistication of the tar¬geted organization, how rhe spy is collecting rhe information he steals, and what personal experience and technical infor¬mation he brings to rhe table when he agrees to spy.

Obviously, if the recruited spy is an employee of anoth¬er spy agency, he will need to exercise extreme caution in avoiding rhe counterintelligence security apparatus that routinely searches for evidence of treason among its own employees. On the other hand, the secretary recruited to Spy on a small business executive may have little reason to fear exposure and thus need Only minimal instruction on the practical aspects of spying.

The training may range from no more than a couple of hours of instruction in a safe house to an extended trip to a neutral third country with long days of specialized instruction. Training also provides opportunity to cement the relationship between the recruited agent and the control apparatus, to tempt the recruit with future rewards, and to make him feel like he now belongs ro a close-knit organization that will pro¬tect him in the event things go wrong.

Special emphasis should be given in the training session on the techniques used to pass both instructions to the spy and the intelligence collected by the recruited spy back to the case officer.

Arrangements should also be made for handling pay¬ments. and the training officer must emphasize rhe need for discretion in how the money earned from spying is spent. The training session should address the question of how to explain sodden wealth—or. better, how to hide it. Rick Ames told his colleagues in the C1A that he had married a Colombian woman who had inherited a great deal of money from her father. (The truth was that Rick's fathcr-in-law left no wealth when he died and Rick spent a good share of his income from spying on the support of the mother-in-law in Colombia.)

150

RUNNING A RING OF SPIES

 


Often, people who arc recruited as spies discover they enjoy the secrecy and the excitement of showing up others, especially those whom they think have underestimated their abilities or taken advantage of them. Good case officers play on this. There may well be no need for secret drops, complicated plans for spot¬ting surveillance, or secret passwords, but dramatics in both the traininc and use of such skills on a regular basis will serve to keep the recruited spy interested in the game.

THE PSYCHOLOGICAL HANDLING

OF A RECRUITED SPY

Eventually, rhe recruit will realize that he is spying on those who trust him. Al this point, the surrogate recruiter should pass full conưol of the recruit to the case officer, if that has not already been done. This passing of control should appear to be a natural result of the recruitment process. In most eases, the recruiter should set up a meeting with the per¬son who will serve as the regular case oliiccr. “This is my uncle, who is going ro help US solve our problem." or “This is the man I told you about, the one who will be paying you from now on.” If the recruit has a dependent relationship with the original recruiter, especially if it involves a sexual relationship, the case officer may want to keep that relationship alive, at least for a short period or until the case officer can manipulate the recruit into a new dependency on the case officer.

At some point, the case officer should guarantee the safe¬tv of the recruit and his family. It is not important whether the guarantee is valid; what is important is dial the recruit believes the guarantees is valid. (A good case officer will engage in any deception—no matter how cruel or false It may he—if rhe deception ensures the cooperation of the recruit.) The more convinced the recruit is that his spying will not result in personal tragedy for himself or his family, if he does TSthat the case officer demands, rhe better spy he will be. (There is nothing wrong with letting the spy believe that if he fails to

THF BASIC STEPS: PHASE Two

151

 


do what the case officer demands, he will be nostril-deep in rising water.)

Each recruited agent requires personal handling. The spy may want a buddy, a confessor, a mother, a leader, a lover, or a general. Ar rhe same rime, rhe case officer must keep his own emotions under tight control at all times and never allow him¬self to develop any kind of emotional attachment (0 rhe recruit. The case officer has to play the great friend and buddy while mentally building a wall that will allow him to use (he recruit in an effective manner without worrying about the conse¬quences. even if that requires placing (he recruit in extreme danger. Yer. he must keep rhe recruit from ever recognizing that he is being exploited in the most cynical manner.

The case officer should watch for signs of stress and be ready to reassure the recruit whenever necessary. Praise can he very important, especially for those who become spies for ideological reasons. The CI A made Oleg Pcnkovsky a secret U.S. citizen and a colonel in the U.S. Army. The KGB made John Walker an admiral in rhe Soviet navy; even though Walker’s motivation for spying was pure greed.

Ar some point money almost always becomes a part of the equation. Paying a recruit works both as a reward and as a means of control, but determining how much to pay him can be tricky. The pay isn't based on what rhe information is real¬ly worth, but rather what the recruit can absorb into his life¬style without making it obvious he has a new source of income. No case officer wants a recruit’s sudden wealth to (ip off his boss that the employee may be working for someone else. The money should be enough to be an important source of new luxury in the recruit’s life, but not so much that it draws rhe attention of his friends, relatives, and colleagues.

If at all possible, the case officer should get a signature on receipts for any money passed to rhe recruit in payment for information, (’rhe case officer can always blame the necessity for a receipt on superiors who don’t trust him.) Such evidence can later be used to threaten an agent who

152

RUNNING A RING OF SPIES

 


wants to back out of his agreement to spy. Once 3 person has turned traitor, he should always fear the possibility that the control officer will betray him if he doesn’t meet rhe demands the control officer makes.

Payments don’t have to be made directly to the recruit. Phillip Agee reports that in Mexico. the CIA supported the mistresses of government officials, paying for their rent, auto-mobiles. and shopping bills. The advantages of such a deal are obvious. There is no paper money trail leading directly to the recruit. He gets the luxuries he wants without having to worry about hiding a rich bank account. Ina similar way. a case offi¬cer might pay off gambling debts, provide vacation accommo-dations. pay for airline tickets, cover rhe expenses of a nursing home for a recruit’s mother, or buy property in a foreign coun-try and register it in rhe recruit’s name.

Once recruited, a spy may continue providing intelligence material for many years. Every intelligence agency has employ-ees who follow career paths that will eventually result in pro-motions and transfers. That means that a case officer in most intelligence-collection operations will sooner or later have to transfer the spies he has been running to a new case officer.

Such a change of case officers presents special problems. Oftentimes, the agent will have developed 3 deep emotional attachment to the case officer and won’t like the idea rhat he is being handed off to some stranger.

The original case officer is responsible for preparing the recruit for his new handler. He should offer credible explana-tions about why he can no longer handle the agent, explana¬tions that fit under the false ilag the ease officer has been using. The old ease officer must brief the new case officer on every¬thing there is to know about the spies he will be inheriting.

Sometimes even the best preparation work won’t make the recruit feel comfortable with his new control officer. Also, It sometimes happens that the recruit no longer wants to con¬tinue spying and will look at the change of handlers as his chance to break loose. In this situation, signed receipts, bank

THE BASIC STEPS: PHASE TWO

153

 


account records, photographic evidence of meetings, and recorded conversations can be very important. All spies are subject to the ultimate form of blackmail: the knowledge that they can be exposed to those they have betrayed.

Even when a case officer must openly threaten a spy to keep him producing, the ease officer should try to shift the blame to some third party. "I'd let you go. but I’m in the same fix you are. The people who control me won’t let either of US go. Neither of US has any choice, unless we arc willing to go to jail, or suffer something worse.”

TERMINATION

All things come to an end. and every recruitment plan should include plans for terminating the arrangement with the spy. The successful case officer will always be the one who decides that the relationship with a spy should end. Spies don't get to quit on their own. Even so. when a control officer decides to cut a spy loose, it goes much more smoothly if the spy can be convinced that the decision was mutual or even his own. That is easy to arrange if the spy wanted out but didn't dare because of fear of what the case officer would do if he tried to quit.

It gets more difficult when the spy enjoys what he is doing and the money he is making. Agents recruited under false flags can usually be terminated with less trouble than agents who know the true identity of those for whom they are working. The case officer who terminates an agent recruited under a false flag must make sure that he will not run into the agent in a public place in a situation in which the agent can learn who the case officer really is. This will be easier to do if the case officer knows a good deal about the terminated agent—his life-style, the place he works, and where he hangs out in his free time. If the case officer should accidentally meet the terminated agent on the street or somewhere else, he must be ready to instantly assume the false-flag role he played when he was running the agent. The longer a case off!-

1S4

RUNNING A RING OF SPIES

 


cer works in any given area, the more likely such an acciden¬tal exposure becomes. This is one reason why most interna¬tional spy agencies rotate their agents into new territories every two to four years.

The case officer should make the termination as easy as possible. He should not say anything critical of the agent’s work, even if he knows the agent has been making up his intelligence. Instead, he should offer excuses that blame someone up the line in the intelligence agency, budget prob¬lems, or even the case officer's own career problems.

Whether it is a false-flag recruitment or the recruited agent knows who he is spying for. if the spy was motivated by greed, he won't be happy with the sudden loss of income and may even try to fake more important intelligence to keep the money coming in. When possible, the case officer should pay the terminated agent some kind of lump sum to case the blow. If the case officer has a file of evidence that the recruit wouldn't want the people he has been spying on to know about, the case officer can make a few veiled threats at the same time he makes the payoff. It works best if the spy is told how long he will be spying at the outset and what kind of sev¬erance he will be paid when his services arc no longer needed.

If the expectation is that the recruit will only be spying for a short time, perhaps only several weeks, then it’s best to include an offer of a substantial bonus at the time of recruit¬ment to be paid once the spy has completed the work.

International spy agencies often employ agents for many years, especially those recruited as access and supply agents. The CIA offers such agents retirement benefits and some¬times even an opportunity to immigrate to the United States for their retirement years. Government case agents usually offer the same kinds of benefits to primary agents who are engaged in the direct collection of intelligence under high- risk circumstances, especially those who become moles. Unfortunately, few such agents have ever lived long enough to collect their promised retirement benefits.

THE BASIC STEPS: PHASE TWO

1SS

 


The worst kind of termination is when die recruit is caught Spying. When (hat happens, rhe primary consideration of the case officer must be to protect himself and the intelligence agency that employs him. The case officer should only attempt to rescue rhe spy if he can do so without risking his own oper-ational safety. In many cases, the case officer provides the spy an escape plan that he can use if he learns he is about to he arrested. But almost any escape plan must be initiated before the spy is arrested. Even then, the discovered spy will be on his own during the initial flight, at least until he crosses a frontier Of makes it to a safe house controlled by the case officer.

If the recruitment is done under a false flag, it’s quite like¬ly that any escape plans previously discussed with (he recruit will include promises that cannot be fulfilled. There was no way that Rashid Yasin could have ever arranged for the Silvermans to immigrate to Israel (see Chapter 6).

Nevertheless, even when a recruitment is done under a false flag, it is much better if the recruit can avoid capture and prosecution. Yasin probably did have a bundle of cash and false documents ready to give Irvin Silverman, along with some suggestions on how they could hide our until “I can arrange transportation to Israel." Unfortunately for rhe Silvermans, things fell apart coo quickly, and Yasin had to save his own skin.

If a spy recruited under a false flag is captured, every mem-ber of chc intelligence ream should hreak off all contact with him. All offices, telephone numbers, safe houses, drops, and message centers should be immediately closed down, and any evidence pointing to the true identity of the recruiter or any of his agents should be cleaned up and destroyed.

Remember, the whole purpose of recruiting a spy is to steal information that the enemy doesn’t know you have. Every termination should be designed to ensure that the theft of the intelligence remains a secret. If that can't be achieved, then the goal IS to make sure that the case officer is not iden¬tified and captured.

ISO

RINMNG A RING OF SPIES

 


Chapter Fourteen

The Security Aspect

O

nce a case officer has recruited a spy, he must take

every possible precaution to ensure that the peo-

ple who arc the target of the intelligence collec-

tion do not learn that they have a spy in their midst. He must

also make sure that should the target’s counterespionage offi-

cers discover that there might be a spy in the organization,

they cannot trace the spy back to the ease officer or even ver-

ify his existence.

THE THREE STEPS TO SECURITY

The case officer must set up procedures for handling the spy that accomplish the following objectives:

Establish security procedures that the rccniit will follow to avoid attracting attention to himself as he steals infor¬mation

Establish secure methods of communication between the case officer and the spy

Reduce personal contacts between the case officer and the spy to the absolute minimum required tn maintain disci¬pline, morale, and operational technique

1S7

 


ESTABLISHING SECURITY’ PROCEDURES

Most recruits solicit advice from their case officers on how ro go about collecting intelligence without getting caught. If at all possible, the case officer should not simply recommend security procedures for the recruit hut also arrange training for him in methods to avoid detection consistent with (he secur¬ity threat under which he will operate.

The Basics of Stealing Secrets

The safest method for stealing secrets is one in which the spy participates in or eavesdrops on conversations during rhe course of his legitimate workday, ur in his ordinary associa¬tions with the targets of the intelligence operation. The spy may attend meetings where intelligence information is dis¬cussed. regularly overhear conversations near the desk where he works, or type up secret reports for rhe boss. In addition to what he hears and sees, the spy on the inside will have regu¬lar access to documents containing sensitive information. He might hold such documents in Ins private office during work hours and perhaps even in an office safe. He may even take documents home to work On.

This is low-risk spying because the spy is doing his job or playing the role that rhe source expects him to play. This IS why Rick Ames was such a dangerous spy. He went to work every day and did exactly what he was supposed to do—and then told the KGB what it was that he had done and learned while on rhe job. The better such a spy plays the role of the loyal, hardworking (but not particularly ambitious) employee, or rhe grand but not demanding lover, the more he becomes the invisible person who makes a perfect spy.

Alternatively, the spy who has a close or intimate relation-ship with a primary source of information—perhaps a mistress or a lover—will get information by listening to the source brag about his work or by eavesdropping and going through docu-ments the source leaves lying around.

I SR

RUNNING A RING OF SPIES

 


The risks of discovery increase when the spy must eaves-drop on conversations he is not supposed 10 hear, such as a secretary listening in on phone conversations or a chauffeur rewiring a connection so chat he can listen to conversations in the hackseat (even when the passengers have turned off the intercom). This risky but often necessary behavior includes deliberately gaining access to documents the spy would not normally see in the course of a workday. A secretary might read documents on the boss’ desk while he’s in (he bathroom, a file clerk might search through flic cabinets that belong ro an officer, or a chauffeur might open a briefcase left on the backseat while the employer goes to a meeting.

These kinds of spies will need the most advice from their control officers, not just on how to steal secrets, but also on how to keep their activities hidden, how to protect what they have stolen from discovery, and how to deliver such material safely to rhe control officer.

In such situations the spy should never steal documents, but should instead copy them or photograph them, if that is impossible, (he spy should read the documents and write a summary’ from memory as quickly aS possible.

The spy should also always have a story ready that explains why he accidentally overheard a conversation or saw a document. “I’m sorry, I didn’t realize you were on the line. I was going to call Nancy in security and suggest we do lunch." If caught looking through papers on the boss' desk, 3 secretary might say, “I'm looking for the budget proposal. Did you pick it up?" Any inane explanation is better than no explanation, provided it is given without hesitation.

Remembering What You Have Learned

The Spy doesn’t just have to worry about getting caught while eavesdropping or reading a document he is unable to photocopy. He must also remember what he has heard or seen, sometimes for up to several hours, before he can find an opportunity to write the details down. Therefore, it is

159

THE SECURITY ASPECT

 


critical for the spy to develop rhe ability to memorize large quantities of information.

Memorization is a talent that can and, indeed, must be practiced. GIXKI spies must develop good memories, and it’s the responsibility of the ease officer to encourage and help them to do so. Exercises in memorization techniques should be included in any training provided to the spy. Here's a sim¬ple memorization exercise.

Watch and videotape a television news broadcast, polit¬ical debate, or a serious discussion of any kind. Wait so minutes, then write out a detailed report of everything you Can remember. Include descriptions of the people who spoke, backgrounds, and any action observed, including unintended subconscious actions (like someone brushing back a loose strand of hair). Replay the tape several times noting all the things you missed in your original report. Do the same thing with additional programs over and over until your memory improves.

As soon as he is alone and can safely do so. the spy should write Out complete, detailed summaries of any relevant con-versations or documents. Perhaps the best way to do this is to dictate into a tape recorder and then write our the report, making the necessary changes as his memory is enhanced by the recording.

If there is any chance that such notes might be discov¬ered, the spy should use some kind of "invisible” or coded writing. This can range from such old standbys as lemon juice, which is then exposed to heat to make it appear, to 3 variety of invisible inks that arc commercially available.

Recording Conversations and Copying Documents

Obviously, it's better if the spy can record a conversation or make a copy of a document. This is a much higher-risk sit¬uation than eavesdropping or sneaking a peck. If someone is Caught taking pictures of documents at work or wearing a wire to 3 confidential meeting, there is no story in the world that

160

RUNNING A RING OF SPIES

 


will convince the security officer that the suspect is engaging in an innocent activity. Indeed, most government agencies that handle classified information prohibit employees from taking personal Cameras to their office. Even so, it’s easy to learn to use a miniature camera: there are a number of such cameras on the market, and every case officer should supply- such a camera to his recruits along with instructions on its use. There are also mini-cassette recorders that can be hidden in 3 pocket and carried into a meeting.

Nowadays, every office has a photocopying machine. The more security conscious the office environment, the more dif-ficult it will be to use the machine during work hours for spy¬ing. Still, many spies find that the easiest way to make copies of a document is to copy it at the office.

Smart spies don't take just the document they want to copy to the copy machine. They hide it in a pile of regular work or some personal material, e.g.. invitations to a party or a child’s homework. Getting caught using the office equipment for personal work may earn a reprimand, but it will be a lot less serious than what would happen if the security officer knew about the top-secret alert list hidden under the child’s drawing of a witch.

When documents cannot be copied in the location they arc kept, the spy may have to remove the documents to a safe place, copy them, and then return them to their storage area. This is such a high-risk behavior that the case officer should personally approve such action, determining first if the intel¬ligence is worth risking the permanent loss of the spy.

Despite the inherent danger in removing documents from an office, the spy can probably get away with it because most office managers get very relaxed about security. Time and again I’ve watched government bureaucrats make photo¬copies of secret documents stamped with clear warnings that no copies were to be made. They did it not because they were spies but because they wanted every person in a meeting to have a copy of the document instead of having to pass it

DIE SECURITY ASPECT

161

 


around. In such a lax security situation. a spy might well be observed copying secret documents and still not be chal¬lenged. In his years as a spy. John Walker repeatedly made photocopies of code books and carried them home ill his briefcase and never came close to getting caught. (Walker was finally caught when his ex-wife, who had known about his spying for years, turned him in to the FBI.)

Computers as Spy Tools

The use of computers hxs totally changed the nature of spying, mostly ro the advantage of the spy. The easiest docu-ment of all to steal is a document stored in binary format in a computer, provided you have access to the computer and know how to access the information. It takes only the right kind of floppy disk and a few seconds alone to copy rhe desired file to the floppy disk.

Most computer security programs are designed tu keep strangers out of rhe sy stem, but the w hole purpose of recruit-ing a spy IS ro have someone who has access to a system. The better security programs have a compartmentalized network that requires passwords to access the most sensitive informa¬tion. However, a knowledgeable computer expen can often hack intn such reserved areas. Berrer yet for rhe spy; those who have access to the sensitive areas of the network arc often extremely careless in keeping passwords secret. They may write passwords down in a notebook; use easily discovered passwords such as their mothers’ names, their addresses, or their birth dates; or gel sloppy about checking to make sure that no one, not even their trusted secretaries, is looking over their shoulders when they log in.

Anyone who intends to run an espionage operation against any modern organization should be thoroughly familiar with computers and should train rheir recruits in (he use of comput-ers. A janitor or chauffeur everyone assumes is computer illit-erate may gain access to the organization s computers ar times of the day when he can brow se through hard disks and network

162

RUNNING A RING OF SPIES

 


dilectones with minimum risk of discovery. I predict lhar, increasingly, the best spy of all will be the individual who has access to the organisation’s computer data disks.

It is not only easy to steal intelligence documents off a computer, it is also easy to smuggle the stolen documents out of the office. Computer floppy disks can be hidden in 3 pock¬et, slipped into the lining of a coat, taped to the inner thigh, or pur into an envelope and mailed out of the building. The information can even be encrypted, then sent our as e-mail to the spy’s home computer.

Computers in the Spy’s home or workplace can also be used as hiding places for stolen digital information.

The techniques of using computers as spy tools and pro-tecting rhe integrity of the files are far beyond the scope of this book. Any intelligence agent intending to use a comput¬er aS part of an intelligence-collection operation should go through the following checklist:

Don't save or store any documents you want to keep secret on the hard disk or a floppy disk with no encryption. Always work on plain text documents in RAM memory and encrypt before storing the information on disks.

Always use a total erase program when deleting any sensi¬tive file from a hard or Hoppy disk that you or your spy¬controls.

Keep all sensitive information in encrypted format on Hop¬py disks rather than rhe hard disk drive and have a hiding place for such disks that is located as far from the comput¬er aS is practical. Take the disks out of hiding only when working on them and return them to their hiding place immediately when you’re finished.

Most encryption systems sold on the market can be easily- broken, including many that advertise they can't be bro¬ken. Many of the encryption systems bundled with word processor software are not secure. Know what makes an encryption program trustworthy.

THE SKCCRITY ASPECT

163

 


Even if you are sure you have the best encryption program available, double-encrypt everything, using two different systems.

If you are sending messages by modem, always use an encryption system based on the RSA analog and 3 public key code. Among the best of these programs is Pretty Good Privacy, which can be found on many computer bul¬letin boards for free.

Change passwords frequently. The great advantage of the RSA encryption system is that rhe public key passwords can be changed daily and given out in an open message.

Be aware that it is possible to read a computer screen from a distance of up to several hundred feet with equipment that can be put together in a garage. Always rake steps to ensure your computer is isolated and electromagnetic emissions arc minimized.

If you don't understand what I’m talking abour in any of the above points, don't pur your trust in computers until you do. If you do understand what I am talking about, you will nor only be able to use computers with some degree of confi¬dence, but you will be able to quickly and easily steal com¬puter data off the computers of most people using them.

Hiding Stolen Documents, Reports.

and Computer Disks

The spy must have a secure place to hide reports, photos, film, documents, computer disks, and anything else he might Steal until they can be safely delivered to rhe case officer. The spy should identify hiding places that include both places where he can store material for several weeks and quickly stash something in an emergency.

The more permanent storage place might be a hidden floor safe at the spy’s home, a safe deposit box in a local bank, a rent¬ed storage space, a watertight box buried in rhe backyard, a hid¬ing spot in an attic or a basement, or a hollowed-out spot in a wall.

164 RUNNING A RING OF SPIES

 


The spy should identify at least one temporary hideaway in every location where he will be holding material for any period of time, even for a few minutes, in case an unexpected visitor pops in.

The temporary hiding place may be nothing more than a desk draper with a false bottom or a picture on the wall with an envelope mounted on the back- it might be a throw nig in a corner, a piece of upholstered furniture with a small slit in rhe fabric, an envelope taped to the bottom side of a desk or file drawer, a plastic bag in a toilet tank, a hollowed-out book on a bookshelf, 3 large vase filled with artificial flowers, or even a piece of outgoing mail, stamped and addressed to a nonexistent person. Such quickie hiding places will not sur¬vive a thorough search by a professional investigator, but if a spy is singled out for that kind of ueatment, his cover has already been blown.

The ability to hide material is SO important that every intelligence collector should make it a habit to identify such hideaways automatically when he enters a room, even if he doesn't have anything to hide at the moment.

ESTABLISHING SECURE CONfM UNI CATIONS BETWEEN THE CONTROL OFFICER AND SPY

The higher the security threat level, the greater rhe prob¬lems associated with personal meetings between the case offi¬cer and the spy. A C1A case officer working under embassy cover in China assumes that the Chinese counterintelligence agency’ will have him under surveillance around the clock, rhe same applies for a KGB officer working out of the Soviet Embassy in Washington, D.c. So in such cases, the case offi¬cer may personally meet with a spy he controls only once every two or three years.

On (he other hand, a tobacco company intelligence officer uho is gathering information on an antismoking political action group doesn’t have to worry too much that someone

THF SECURITY ASPECT

165

 


might spot him meeting with his spy inside the target group. Yet, even in this relatively secure situation, the less the peo¬ple being spied on know about the case officer and his con¬tacts with the spy, the better the security.

Fortunately, when personal contact between the two is most critical (during the recruitment phrase), the recruit will not be doing any actual spying and the risks of the operation being discovered are not as great as they will eventually be. Once the spy starts providing intelligence, he will realize that he is engaged in a dangerous activity and will be anxious to avoid detection. Therefore, he will probably concur that he should limit further contact with the case officer to occasional meetings and that he must exercise extreme caution in pass¬ing stolen information on to the case officer.

Although a case officer should handle his spies from as great a distance as is feasible, he must also establish a system for the spy to pass information ro the case officer and for the spy to receive queries, instructions, and payments. This is when both the spy and his case officer are most vulnerable to identification and capture. Therefore, case officers working in dangerous circumstances, such as someone spying on the CIA for the KGB, go to great lengths to limit the direct contact between a case officer and the spy. (For example, while spy¬ing for the KGB. John Walker met with his control once every two or three years.)

Communications between control and spy in high-risk sit-uations are often limited to some variation of publicly posted messages and the use of dead drops. Publicly posted messages are coded and placed in locations that tell cither die case offi¬cer or the spy that a certain planned action should be taken. Such messages might be an advertisement in a newspaper, 3 poster on a bulletin board in a supermarket, a piece of graffiti on a wall, or a chalk mark on somediing that can be seen from the sưcec. A dead drop is a place where documents, films, money, and other materials can be left by one party and picked up by another party with no direct contact between them.

166

RUNNING A RING OE’ SPIES

 


KGB case agents operating in the United States during the Cold War preferred public mailboxes as the place to post a coded command. When Rick Aines had documents to pass to his KGB control officer, he would make a chalk mark on one of three different drop boxes situated on corners on his route to and from work. The mark would be a cross, a trian¬gle. or some other simple design. The KGB case officer would drive by each of the letter boxes once a week or so. Whenever he saw- the coded mark, he would know that Ames had some¬thing to deliver. He would then wipe the mark off the mail¬box as a signal that he had seen the mark.

When Ames saw that his message had been received, he would take the packet of material ro a dead drop he had already been told about. The KGB case agent handling Ames proúded detailed instructions on the location of dead drops— including photos of the spot marked with a felt or a grease pen. The pictures and the text showed where to find the des¬ignated dead dtop, which might be a hollow ưce or a metal box’ hidden behind a rock in a wooded area or thick bush.

A similar dead drop arrangement is used by the case offi¬cer to deliver materials or information to the spy—e.g., special instructions for setting up a face-to-face meeting, any pay¬ment owed to the spy, and detailed directions for where the nexr dead drop would be. Naturally, both parties have to exer¬cise extreme caution in approaching a dead drop to ensure that they arc not under surveillance.

There arc hundreds of different ways for posting dis¬guised messages in public places. An advertisement in a newspaper’s personal section might read, “John, Marsha still loves you." but mean, “1 have information for you to collect at the drop.” The disguised message could just as easily be something in the lost-and-found section. "One black dog who answers to Red." could really mean “You have a drop waiting at post red.”

During World War II. the British government regularly passed information to agents behind German lines by coded

THE SECURITY ASPECT

167

 


announcements on the BBS short-wave broadcasts. Other ways of posting public messages include arranging, the cur¬tains on a window in a special way, leaving a car parked facing down the driveway instead of up, putting an item such as a child's toy in 3 car window while the car is parked in its usual place during, the workday, or even wearing a particular item of clothing, say a hat 01 a topcoat nor worn at other rimes.

Lower-Threat Security7 Situations

Recruiting and managing spies in low-threat situations involving private parties or commercial businesses will general¬ly nor involve the extreme communications procedures just described. Nevertheless, there is always a chance chat the target of the spy operation will identify the recruit as someone who may be spying against it. If thar happens, the target organiza¬tion's counterespionage officers will attempt to follow rhe spy and identify who is receiving the stolen material. Therefore, in even a low-threat situation, rhe case officer must not allow any¬one ro identify him as someone who has regular contact with the Spy if he has no good reason ro be meeting with him.

Direct Visual Contact

When dealing in a security situation in which there IS lit¬tle chance that the intelligence target could identify the control officer as an intelligence collector, the case officer can set up occasional visual contacts under circumstances in which either the rcciuit or the case officer can initiate the contact when both are in the same area, if there is a need for such contact. Such approaches should appear to be a part of the regular life-style of both the recruit and the case officer. The two people might go to the same church every Sunday, cat lunch in the same restaurant once a week, regularly attend movies at the same theatre or rent videos at the same store, jug in 3 park at the same time each day. or use rhe same supermarket for weekly shopping. The case officer and the recruit can stop and talk to each other for a few moments when they meet, passing verbal

168

RUNNING A RING OF SKIES

 


information back and forth aS required. They might even pick a small bar or a park bench as a meeting place.

In more security-sensitive situations, the case officer might arrange a simple scries of visual signals that can be com-municated if contact is desired as he and his spy pass each other or spot one another across a room or an open area. These kinds of signals are limited only by the imagination of the case officer and the setting of the assignation.

In one example, an intelligence entrepreneur who worked for a major manufacturing firm recruited a spy inside the regional Occupational Safety and Health Administration (OSIIA) office. The spy’s sole responsibility was to collect any information on employee complaints filed against rhe compa¬ny so that company directors could take corrective action before an OSHA inspector showed up at the plant. The spy was an avid jogger, so the case agent began jogging on the same path as the spy a couple of times a week, but the agent ran in the opposite direction. Most of the time they would pass each other without even a nod or a smile of recognition.

Whenever the spy had something to pass on, he would wear a college sweatshirt when he jogged hut would give no indication he knew the case officer when they passed on the trail. The spy would put the information in a dead drop the cxr day, hiding it in a plastic bag that he would toss in a trash can along the jogging path. Within minutes, the case agent would pick up rhe bag. retrieve the document as he jogged along, and then put an envelope with the payment in the bag and drop the bag into a second trash can along the way. The spy would pick up the payment as he passed the second trash can on his way back home.

Each of the joggers had another special sweatshirt he would wear if he had something to talk about. When the jog¬gers saw that signal, they would pull up and stop at a drinking fountain along the way. taking time for a quick chat, but they would never exchange any material at that time.

In other situations, wearing a wristwatch on rhe right hand

THE SECURITY ASPECT

169

 


mighr indicate a request for .1 private meeting or the need to deliver information. Placing specific items in a shopping cart, carrying a magazine under a specified arm. wearing a har or not wearing a hat, removing and cleaning a pair of glasses, dropping something and then picking it up. or crossing one's legs while sitting on a park bench can all be arranged signals between the agent and his spy. The messages and the codes should be kept as simple as possible, limited to pretty much the following kinds of statements:

I have material ro pass to you.

We need to meet so we can talk.

I 3m being followed.

You have a tail.

Everything is okay.

Both rhe circumstances and rhe specific codes used should be varied, and whenever he makes a drop, the case officer should pass on new instructions to be followed until the next drop.

Making an Exchange

There are many different ways to make exchanges in low- threat security Situations without allowing anyone to see the spy and the case officer exchange anything. For instance, the spy-might follow the control officer into a bathroom, where each enters a stall. The spy passes 3 package of stolen secrets under the stall wall to the Case officer. He remains Seated until the case officer has left the bathroom with the package. Or two people, each carrying briefcases, board a bus at two different stops. They stand or sit near each other. When one of them gets off the bus. no one nonces thar they have switched suitcases.

Couriers

Some intelligence officers prefer to use couriers, usually service agents, to carry information back and forth between

I/O

RUNNING A RING OF SPIES

 


case officers and theii recruits. Sometimes the courier is someone already inside the social circle of rhe recruit, but is a person whom rhe case officer recruited separately. Sometimes a courier may be the person who first helped entrap the recruit, such as the woman who started sleeping with him or the man who loaned him money. Sometimes a courier will be unfamiliar to and with the recruit and the material he is carry¬ing back and forth. A case officer might even use a profes¬sional messenger service. However, all material sent by couri¬er or messenger must first be encoded in some way.

Postal Service

Although seldom discussed in the literature of spying, the mailman delivers a good percentage of the communications between spies and their recruits. The case officer will rent a post office box, a commercial mailbox, or sometimes a small apartment or business office that will also serve as pan of his false-flag cover. '1 his allows the spy to mail whatever he has to the case officer.

It may even be possible for the spy (0 use the postal sys¬tem at his business, government, or embassy office. All the spy has to do is drop a letter with a fake return address into a mailbox. Two days later, rhe case officer can pick up the infor¬mation at his post office box. which is rented in a fake name and home address. For additional security, the case officer will not pick up his mail personally, but rather send a service agent who will follow standard surveillance detection and avoidance procedures before and after he has picked up rhe mail.

'lire mail can be used both ways. The recruit can also rent his own post office or commercial mailbox to which the case officer can send him mail.

It may nor be necessary for the recruit to bother with pri-vate mailboxes, especially in the United States. Because of rhe massive amount of junk mail that is dumped into every mailbox in the country, it is easy for a case officer co send mes¬sages to a spy that are designed to look like junk mail. The

THE SECURITY ASPECT

171

 


piece of junk mail could be an invitation for a “free trip" to Las Vegas, an obvious sweepstakes scam, a solicitation to buy Stocks ur a rime-share apartment, or any of the other scams used by direct-mail pitch artists. Only rhe recruit will recog¬nize the piece of mail as a message from his control officer. Such a Scheme may even involve secret writing; passing an iron over the message or perhaps wiping the page with a chemical solution will bring our the secret message written in the margins.

Telephone Communications

The number of daily communicarions during which sen-sitive commercial, government, and personal information is exchanged numbers in the tens of millions. Business execu¬tives discuss mulribillion-dollar contracts, police officers talk about an upcoming drug busr, and thousands of men and women set up rendezvous for adultery every day and never have any fears about being tapped. At low-threat security lev¬els, the case officer and the recruit will probably talk from rime to rime on the telephone. However, anyone engaging in any illegal activity takes a great risk discussing such activity over an open phone line.

Despite both the legal and technical difficulties, govern-ments can intercept and listen in on phone lines, and they will do so if they have enough reason to focus on 3 single individ¬ual. If a government agency suspects that one of their employ¬ees is spying, one of the first things they will do is request telephone records and put a pen register order on the line. A pen register (used by police) will record all the numbers that any given telephone dials. Such a technical step, which is done at the telephone exchange rather than where the spy is located, does not require a court order. Therefore, once a spy comes under suspicion, law enforcement officers will quickly he able to identify every number he calls in the future and all long-distance numbers he has called in the past. At some point, the government will get enough evidence to obtain a

172

RUNNING A RING OF SPIES

 


warrant for a phone tap. Well-financed criminal organizations and large corporations can also usually find a way to cap a line, even though they will have to break the law ro do it.

Anyone engaging in spying in high-risk situations should use extreme caution whenever talking on rhe telephone and assume that someone is listening to every vord.

Whether one is an intelligence officer or just an ordinary guy, the following list of telephone security rules will keep anyone out of trouble.

Don’t ever discuss any illegal activity over any telephone to which you arc known ro have access. If you must make a call for such 3 purpose, make it from a public phone to a public phone. Illis means that arrangements must be made in advance so that the person receiving rhe phone call w ill be monitoring (he public phone when it rings.

Whenever using a public phone or making sensitive calls from a private line, either pay with coins or with a prepaid long-distance card, which can be purchased anonymously in supermarkets, drugstores, and even the post office and cannot be traced to you. (Remember that these prepur¬chased telephone cards can be used to make local calls, albeit at long-distance charges.)

Remember that the easiest way to intercept and listen in on a telephone call is to pick up an extension.

Don’t discuss sensitive information, even your credit card numbers, over any cellular, cordless, or other type of phone rhat transmits a radio signal.

Don’t use clever code words or trite phrases, such as calling cocaine “Coca Cola" or talking about going on a “fishing trip" when the planned activity is a recruiting session with a potential spy. If you find it necessary to talk in any kind of code, then you should be sending encrypted messages through the most sophisticated encryption systems available.

If a phone must be used in an emergency, use a simple code to

THE SECURITY ASPECT

173

 


tell the other pain to go to 3 prearranged public or safe phone and stand by to receive a call or to call a prearranged number.

Using Computers and Modems

for Secure Communications

Just as rhe author cannot address all the issues of using computers in data theft, storage, and retrieval, neither Can he explain in this book all of the ins and outs of using computers for secure communications between a case officer and a recruited spy. Nevertheless, if both the case officer and rhe recruit have access to a modern computer, a modem, and a telephone line, then the case officer will want to take advan¬tage of the World Wide Web and e-mail.

Because all modem signals travel through commercial telephone lines, they present all the same security problems that the telephone presents. Phone lines can easily be tapped by law enforcement officers or anyone who has access to the interior of the building or the phone connection box. People who tap phones will have computers and modems, too. Send an open message by modem and they will read it before the addressee secs it.

Even so. computers and modems can make communica¬tions much more secure than a simple phone call, provided the operators understand rhe technology and rhe systems—as well as their limitations.

E-Mail

The first advantage of computer communication is e-mail. Anyone with an Internet connection or a connection to such commercial information services as CompuServe, America Online, or Piodigy can send anyone a message, any place in the world, by connecting with 3 local number. Pen registers and phone records will show only the number of the Internet server or the information service.

No e-mail message is secure unless it is encrypted with a sophisticated encryption program. It can be intercepted while

174

RUNNING A RING OF SPIES

 


It is in rhe office network, on the Internet, stored in the hard drives of the computer information service, and in transmis¬sion. E-mail messages are also on rhe hard disks of every- com¬puter they pass through, often for long periods, even after they have supposedly been erased. Much of the Irangatc scandal chat so badly damaged the Reagan administration's public image resulted because people like Lt. Col. Oliver North didn't realize how public e-mail can be and how com¬plicated it is to erase e-mail so that it can never be recovered at any point along rhe line of transmission. No one should ever write anything in an open e-mail message that he wouldn’t write down on a piece of paper and COSS out the win¬dow for anyone to read.

Despite the many security risks, e-mail does provide a quick and easy way to post public messages. Ĩ.C.. messages that appear to be innocent but are in fact coded instructions. Internet newsgroups, discussion groups on the commercial services, and thousands of private computer bulletin boards provide places where anyone can post a message as part of an ongoing public discussion. Literally thousands of different subjects arc continually debated in such open forums with lit¬tle or no limitation on who can post a message or what can be said. Insults arc traded back and forth, and a lol of illogical nonsense floats thiough rhe discussions.

To set up a system of public messages, both parties have to do the following three things: 1) know the e-mail address or cover name each will be using. 2) agree on the public discussion group they will use and the coded wording to be used, and 3) know the time frame for checking messages. For example, the case officer checks the news group alt.talk.guns on a daily basis, watching for a message posted by wcre.dog@supercom.com. When he finds such a message and it includes the word ftfZr, he knows that there is a package waiting for him ar the drop site.

This is a much better means of posting public messages than buying an ad in a newspaper and running a coded message or making marks on mailboxes.

THE SECURITY ASPECT

175

 


Encrypted E-Mail

Some computer encryption programs make it possible ro send e-mail messages in an encrypted format that may be so secure that even rhe National Security Agency’s computers won’t he able to break the encryption. Again, any case officer who doesn’t know a lot about encryption should not attempt to use computer encryption in a high-risk security situation. But those who do understand this esoteric subject can send e- mail to anyone in the world with a reasonable cxpecrarjon rhar the message w ill be read only by rhe recipient.

Encrypted e-mail messagescan be sent through the Internet, commercial computer information services, private bulletin boards, or direct compurer-to-computer phone connections.

However, there is one serious problem with an encrypted message: rhe mere fact that it is encrypted will be seen as evi-dence that both parties arc engaged in some kind of illegal, immoral, or disloyal behavior, if a government agency sus¬pects that an employee is spying and it taps 3 line and discov¬ers that he is sending encrypted messages to someone, the bureaucrats will rake that as proof of spying.

The way to avoid this problem is to rake the same pre-cautions that you do to talk on the telephone. Both panics use public phones, and if the calls are long-distance, they pay with either coins or. better, the prepaid telephone cards. Besides encryption, another advantage of computer communication is that both parties don't have to be on the line ar rhe same time to communicate.

A scenario such as the following might work. Earl I larden. a real estate speculator, recruits Dennis Powers, an engineer working for the City Highway Commission, to copy files out of the com¬missions computer that describe future city highway constmenon routes. On the first Saturday of each month. Harden checks into a hotel under tile name of Craig Beasily. He attaches the modem of his desktop computer to his room telephone and sets the comput¬er software so that it will answer the phone when it rings. (Harden doesn't have to wait in the hotel room for the call.)

176

RUNNING A RING OF SHIES

 


Sometime during chc day, Dennis Powers takes his note-book computer to the city airport where there is a courtesy office for business travelers. He connects his modem to the phone at a courtesy desk and, using his prepaid calling card, calls the horcl and asks to be connected to Craig Bcasily's room. When the computer in the hotel room answers. Dennis punches the right commands, and his computer downloads the latest stolen data in encrypted format to Hardens computer. He then downloads a flic from Harden's computer, which passes on instructions for future contacts. Later in the day. Harden picks up his computer and pays his hotel bill in cash.

REDUCING PERSONAL CONTACTS

Obviously, you should avoid personal contact as much as possible. But even in high-risk situations, both the control offi-cer and the recruit will occasionally have to meet face-to-face. Sometimes, the spy may request such a meeting to ask for more money or explain why he can’t produce everything the case offi¬cer expects of him. More often, it will be the case officer who will request the meeting, perhaps to provide some additional training and guidance, administer 3 polygraph test, or do an in- depth interview to evaluate the honesty of the spy’s reporting.

The case officer must remain in conưol when it comes to arranging meetings, even when it is the spy who is requesting the personal contact. The case officer must decide where and when to meet and how the recruit will travel to the meeting place. He should pick meeting places where he is totally famil¬iar with the layout and the ordinary traffic through the area.

Government intelligence case officers working in high- risk situations will prefer, if at all possible, to hold meetings with recruited spies in a third country, preferably one in which the local government is more friendly toward the government who is running the spy. Remember that the Mossad seldom puts its case agents in a hostile Arab country. It recruits Arabs

THE SECVKITY ASPECT

177

 


as spies while they are traveling in Western countries and holds all meetings with such spies in friendly Western coun¬tries. In the case of Rick Ames, the KGB conUol officer would nicer with him in Colombia while Rick and his wife were vis¬iting her mother.

Even those who are engaged in private intelligence col-lection are well advised to meet wirh the spies they control in another state, another region of the country, or even another country. The farther they arc from home territory, the less likely it is that rhe relationship will be accidentally exposed.

If the spy cannot travel to a distant place or a foreign country, then the case officer will have to identify a secure place where the meeting can be held closer to home. In low- threat situations, the case officer may decide to meet in some public place, say a park or restaurant. However, if the session will include training or last a long time, the case officer will want to arrange fur a safe house.

Safe Houses

A safe house is any private place controlled by the case officer or his agents, which has not been identified by any counterespionage or security agency. Ir may be a rental house on a large piece of property or an apartment, but it works bet¬ter if the apartment is not tn a building that has a doorman or a security system. Hotel rooms can also be used as a safe house. When the room is rented just before a meeting is scheduled, the case officer can be reasonably certain that the room is secure, especially if he or one of his agents picks up the spy at another spot and rakes him to the hotel.

It is always best if the recruit doesn’t know prior to the meeting where the safe house is. He should be picked up at another site and taken to the safe house. If rhe case officer intends to continue to use the safe house, the spy should be blindfolded or perhaps travel in the back of a truck or van so he can't see the route of travel.

Whenever the case officer meets one of his spies, the case

178

RUNNING A RING OF SPIES

 


officer must always arrive ar rhe selected sire before rhe recruit. Someone working for the case officer should keep the recruit under surveillance from (he time he departs for (he meeting until after he has returned to his home or place of business. If the case officer or his agents spot anyone sur¬veying the recruit, the meeting sire, or rhe case officer, rhe meeting must be aborted and the case officer should leave the area immediately.

If the meeting includes a training session or a trip to a for-eign country, the spy must have a good cover story to explain his absence to his employer and family. Although it may never be used, (he cover story should include innoctm explanations for the spy’s actions at every point during the trip, from his home or office co (he location of the meeting.

The best cover stories are those that include several differ¬ent layers of deception. In one example, a Colombian drug ring had recruited an informant inside the Coast Guard office responsible for drug interdiction on the high seas. The drug car¬tel ease officer wanted three days with the informant, a young flight lieutenant, to train him in the use of a sophisticated com- pu(Ci communication system the spy would be using to send his reports to Colombia via the Internet. The drug lords, through a company they controlled in Mexico, ser up a tourist promotion¬al contest that olfcrcd a week's vacation in Cancun, Mexico.

The lieutenant entered and won the rigged contest and took the trip. After he checked into a hotel in Cancun, he met a pretty Argentinean woman at the hotel bar in what would have appeared to any surveillance to he a casual pickup. The Argentine was an expensive international prostitute who had been hired by the drug cartel but who had no idea she was working for drug traffickers. She carried a scaled envelope of instructions that she gave to the Coast Guard officer as soon as they were alone in a hotel room.

After spending the night with the woman, the lieutenant called his office back home and told his secretary that he was taking a car excursion to visit the ruins in the Yucatan

THE SECURITY ASPECT

179

 


Peninsula for the day. He then rented a car and asked for a map of the Yucatan before driving away with the Latin American woman by his side.

Following the instructions, they drove to a Mexican town on the river across from Belize. The two checked into the best hotel in town. The lieutenant then deliberately disabled the rental car and left it in a local repair shop to be fixed. A san picked him up as he walked back to the hotel and took him to a ranch several miles outside of tow n and on the Belize side of the river where the lieutenant spent two days in training. The Argentinean woman staved in the hotel room in town, order¬ing room sen ice for two and keeping the “Do Not Disturb" sign hung on the door. (The cartel supplied another woman, one who spoke no English, for the lieutenant's pleasure dur¬ing his two nights at the ranch.)

When the lieutenant finally returned to his hotel in Cancun. he called his secretary and described an unfortunate story of his car breaking down and his spending uncomfort¬able nights in a small Mexican town. Noone ever checked his story. but if someone had. that person would have discovered the lieutenant's secret sexual escapade, but no evidence that he had ever entered Belize from Mexico.

ISO

RVXXIXG V RIXGOF SPIES

 


Chapter Fifteen

Case Studies

F~~t \ he following studies demonstrate the different techniques and plots that can be used to recruit JL a spy. Readers should ask themselves how they would have created the scenario, what stage decorations they would have used, how they would have approached the target for recruitment, and how they would have led the target into treason.

CATCHING QADDAFI S FLUNKY

In 1980. Khalid Al-Daraji. a Libyan munitions expert, was working on the Libyan air defense program. His duties some¬times required stays of several weeks in Rome as part of the Libyan effort to buy high-tech air defense weapons from European firms willing to trade technology for petro-dollars. Khalid always left his wife and family in Libya when making such trips. The CIA identified Khalid as a possible recruit who might tell it something about Libyan air defenses. CIA intelligence officers working undercover in the U.S. Embassy in Rome designed and implemented a plan to entrap Khalid the next time he showed up in Rome.

As was his custom, on his next trip to Rome Khalid stayed

181

 


in a small hotel apartment and cook the bus each day to his office in rhe Libyan Embassy. As he was waiting one morning ar the bus stop, a young Italian woman walked up and stood waiting beside him. She smiled at him, but neither spoke. A few minutes later, a large sedan pulled up ro the curb, driven by a middle-aged man dressed in a business suit; rhe Woman got into the ear. and off they drose.

For the next three days. Khalid found the woman waiting for her ride when he arrived at the bus stop. She W3S always rhe only other person standing there. While she always smiled at him, and a couple of times said good morning, the shy Khalid never rried to Stan a conversation. Each day the man in the car came by and picked her up.

On the fifth day. the car didn't show up ar the usual time. The woman didn’t look worried about rhe failure of her ride to appear, and about five minutes later she boarded a bus that always passed the stop just a few minutes before Khalid's bus came by.

Less than 30 seconds after the bus had pulled away, the man in the car pulled up to the stop. He rolled his window¬down and asked Khalid if he had seen the woman he usually picked up. Khalid answered that the woman had just taken a bus. The man thanked Khalid, and then, in what appeared to be an afterthought. asked Khalid where he was going. When Khalid told him. the man said he was going that way and offered Khalid a ride into the city center, which he accepted.

The driver of the car, who spuke English w ith a British pub¬lic school accent, introduced himself as Matthew Clark. He explained that the woman, Eva, and he worked in rhe same building. He gave her a ride whenever it was convenient.

For the next several days, when Clark stopped to pick up Eva, he also offered Khalid a ride. As they rode along, Matthew directed the conversation mostly ar Khalid, asking him about North Africa and Libyan culture. Matthew also talked a little about himself and his business, which was putting together international trade deals for 3 German trade

182

Ri INNING A RING OF SPIES

 


consortium. By the third day he was asking Khalid questions about the Libyan economy and the possibilities for trade opportunities in Libya.

When (he conversation drifted into a discussion of restau-rants on rhe fourth day, Matthew asked Khalid’s recommen-dation for a good North African restaurant. When Khalid replied that he almost never ate in restaurants, Matthew insisted that Khalid go to dinner with him that evening. Khalid accepted the invitation but suggested he would prefer to try a good French restaurant. Matthew took the suggestion as evidence that while Khalid was enjoying his new- friend¬ship, he did not want to risk dinning into anyone from the Libyan Embassy while in the company of a European. Matthew then asked Eva to join them as he planned on cak¬ing Martha. (It was rhe first time that Matthew had men¬tioned he had a woman in his life.) At dinner. Matthew intro¬duced Martha as a business associate, although they acted more like lovers. Khalid found Eva a very friendly dinner partner, who was obviously interested in him as a man.

1'hus began a four-way friendship that quickly became an important part of Khalids Roman experience, but one he never mentioned to his Libyan colleagues at the embassy. Khalid especially wanted to keep his romance with Eva, which had blossomed during the first dinner engagement, a secret from his Libyan compatriots. That very night. Eva had invited Khalid to her own apartment, just down the block from Khalid’s apartment, and made love to him. After that. Khalid and Eva frequently went out to dinner with Matthew and Martha, with Matthew always picking up the check.

Increasingly, Matthew focused the conversation when they were together on possible trade opportunities for his firm in Libya. When Khalid talked enthusiastically about several different possibilities for trade, Matthew asked if Khalid could put some of his thoughts down on paper, promising to pay Khalid if (he report proved useful in discovering possible Libyan trade opportunities.

183

CASH -STUDIES

 


Khalid prepared such a report, which contained nothing of a sensitive nature. Matthew praised the information and a day later passed Khalid an envelope stuffed with Italian bank notes, which he claimed was payment from his part¬ners. Khalid used most of the money to buy an expensive present for Eva. who was now sleeping at his apartment almost even, night. Khalid, whose circumcised wife back in Iran found sex a painful experience that she endured as sel¬dom as possible, was getting the best sex of his life and doing a lot of pillow-talk bragging about the important work he was doing for his country.

On two more occasions, Matthew asked Khalid to write reports on economic and political developments in Libya, paying him well for each effort. The next time that Matthew asked for a report, he requested that Khalid jot down specific comments on Qaddafi's political future and the possibility of his overthrow.

Khalid's first attempt quoted the official Libyan line, say¬ing only the nicest things possible about Qaddafi. Matthew- rejected that attempt and refused to pay for it. insisting that Khalid write the truth as he knew It. not Libyan propaganda. At the same time, Eva was suggesting that she and Khalid fly to a Mediterranean resort for a weekend getaway, an expense that Khalid had no way to pay for unless he could collect another payment from Matthew.

After a couple of days, Khalid gave Matthew a report on Qaddafi that criticized rhe dictator and described a number of atrocities he knew Qaddafi had committed. Even so. the report predicted that Qaddafi had a permanent hold on flower and that he would probably rule until the day he died of old age. Khalid begged Matthew not to divulge to anyone who had prepared the report, and Matthew promised that Khalid had nothing to worry about. Matthew paid Khalid enough to splurge in a big way on his weekend with Eva.

The next time Matthew asked Khalid for more informa¬tion. he asked for information on the Libyan air defense sys- 181 RVNNING A RING OF SPIES

 


tcm. explaining that his trade consortium hoped to outbid the current suppliers for the Libyan government purchases. Matthew assured Khalid that he would be serving Libya’s best interests because Matthew's consortium would be able to supply better, more modern equipment at a bargain price. However, in order to make an offer that would impress Khalid $ bosses in the Libyan government, Matthew needed details on what kind of equipment the Libyans had already purchased, who had supplied the equipment, how much they had paid for the equipment, and how the equipment was posi¬tioned to defend Tripoli and Benghazi.

Matthew promised Khalid that if his information made a deal possible, he would make Khalid a secret partner and Khalid might well make a hundred thousand British pounds or more. Matthew suggested that in anticipation of such wealth. Khalid ought to open a secret Swiss bank account and gave a bit of advice on how Khalid could do that.

Both Eva and Martha listened as Matthew made his pro¬posal. As soon as she and Khalid were alone, Eva began talk¬ing excitedly about the expected money, and that night, Khalid experienced the best sex ever. In the morning. Eva suggested that if Khalid earned the expected money, he might set her up in an apartment in Tripoli as a permanent part of his life.

Khalid had to rewrite the report on Libyan air defenses several times, each time adding more detail at Matthew's insistence. By the time the report met Matthew’s demands, Khalid must have realized that he was selling his nation's closely guarded secrets. He no doubt continued to tell him¬self, however, that he was selling those secrets to people who would never use them against Libya.

In fact, rhe information provided by Khalid played a key role in the planning for the U.S. air attack on Tripoli on April 14. 1986.

Matthew Clark was a CIA case officer working under a false flag. He was backed up by a team of a dozen agents.

CASE STUDIES

185

 


Martha was a CIA expert on air defenses assigned co the case to provide technical advice to the CIA case officer. Eva was a very expensive Italian prostitute who had no more idea of the rme identity of Matthew than Khalid did. The original plan was that Khalid would take the hint ar the bus stop and Starr flirting with Eva. which in turn would lead to a date and then sex. after which she would introduce him ro Matthew. W hen the shy Khalid didn’t take the bait, Matthew changed the plan and made the approach by offering Khalid a ride. From there, things went according to plan.

WHO’S THE SPY?

Lester Stapler got caught up in what is perhaps the most convoluted spy recruitment involving a false flag ever put in place. Stapler had been employed as a civilian intelligence analyst for (he Defense Intelligence Agency (DI A) for seven years. Then he left the agency and started his own private international consulting Finn.

Working under contract with a Ư.S. airline company. Stapler went to Mexico City on an extended business trip. While there, he was approached by George Brennan and Kenneth Brauer, who identified themselves as CIA intelligence officers attached to the U.S. Embassy in Mexico City. They said they knew’ about his previous employment with the D1A and asked him for assis¬tance in setting up a scam to penetrate the KGB operation in Mexico, telling him he would be serving his country while mak¬ing some good money. 1 hey explained they wanted Stapler to pretend to be a financially strapped U.S. businessman who wanted to cash in on things he knew about the D1A by selling information to the local KGB resident.

The two CIA agents assured Stapler that he would be working as a contract employee of the CIA while performing rhe service. He was given a civil service application form to fill out, W-Z forms, and applications for insurance and death ben-efits, as well as the standard security clearance update forms.

186 RUNNING A RING OF SPIES

 


Stressing thai it was critically important that Stapler con¬vince the Soviet resident char he had information worth sell¬ing. George and Ken told Stapler to give the Soviet agent a lot of detail about his work at the DĨA. When Stapler expressed some hesitation in doing that, fearing he might let slip some secrets, rhe three men spent several days in a hotel room going over what Stapler could re’ll the Soviet agent about his previous employment and what he shouldn’t mention.

During those long sessions, the two CIA men had Stapler describe in detail what he did during his seven-year career at the DIA. They drafted several dozen different messages ro the CIA headquarters asking for specific clearance for what things Stapler could release and what things he should not mention.

The two CIA men also gave Stapler a direct phone num* l>er at the embassy where he could contact them. Stapler called rhe number several times. The phone W3S always answered by a female secretary speaking Amcrican-style English with a slight Mexican accent and telling the caller he had reached the U.S. Embassy'.

During the long sessions in hotel rooms, the two intelli¬gence officers frequently talked on the telephone with some¬one at the embassy while Stapler listened to their side of the conversation. They also showed Stapler the answers to the messages they had sent to Washington.

The three men eventually developed a playbook of spe¬cific things that Stapler could tell (he Soviet case agent once contact had been made. The final script ended up being so bland that Stapler expressed some concern that it wouldn't he enough to satisfy (he Soviet officer. Nevertheless, the two CIA men insisted that once contact had been made. Stapler would not give the Soviet agent anything he wasn’t autho¬rized by Washington to give.

When the two CIA agents were satisfied that Stapler was ready, they directed him to make contact with the Soviet agent, pretending (0 be a walk-in. Stapler walked into the Soviet Embassy in Mexico and gave the story about wanting

CASE STUDIES

187

 


(0 sell secrets. He was soon talking co an agent who called himself Boris. Stapler followed the script approved by the CIA headquarters and reported back to Brennan and Brauer after rhe meeting. The two CIA agents were ecstatic, celling Stapler that he had met w ith Buris Kornplektov. one of the top KGB case officers in Mexico.

Stapler met several more times with Boris, who insisted with increasing agitation (hat Stapler provide more sensitive information as proof of his sincerity. Boris’ demands for more detailed information resulted in more long discussions with the two CIA men over what Stapler might tell the Soviet agent. The two CIA men drafted more cables and a day later showed Stapler rhe replies, which denied permission to give any more sensitive information to the Soviet intelligence offi¬cer than what Langley had already approved.

Stapler met once more with Boris, who abruptly terminat¬ed the conversation and told Stapler that the information he was trying (0 peddle was worthless. When Stapler reported back to George and Kenneth, they thanked Stapler for his cooperation, agreeing with Stapler that the ploy hadn’t worked because of the CIA's unwillingness to throw more truth into the equation.

The two CIA men did insist that all had not been lost: they had at least learned a few things about how the KGB handled a walk-in. They stressed the importance of keeping the whole thing secret and showed Stapler a request they were submitting for a substantial bonus for Stapler s services. They promised Stapler that the U.S. Treasury Department would issue a check, which would be mailed to his U.S. bank account. Staplers next bank statement showed the money had been deposited as promised.

This might have ended the whole affair, except that sev¬eral weeks later when he was back home in the States. Stapler read a news article reporting that the U.S. Embassy in Mexico City had an office of the FBI that monitored Americans seen entering the Soviet Embassy, which was suspected of being a

188

RUNNING A RING OF SPIES

 


favorite spot for wotild-bc spies to make contact with Soviet intelligence officers.

Based on his own experience working in the U.S. intelli-gence communin’, Stapler was only too aware of how intera-gency competition sometimes kept the right hand from learn¬ing what the left was doing. Increasingly concerned that the FBI might have seen him talking to the Soviet agent and that the CIA may not have bothered to tell the FBI about its little attempt to entrap a KGB officer. Stapler tried to contact George Brennan and Kenneth Brauer, using the embassy number they had given him.

A recording in Spanish told him that number was no longer in service. Stapler found rhe listed number for the U.S. Embassy, called iu and was told no one by those names was now or ever had worked in the embassy. Stapler then decided to go to rhe FBI. describe what had happened, and make sure he wasn’t on some FBI list of potential spies.

He immediately found himself accused of spying, based on his interview with the FBI in which he admitted having met with Boris in Mexico City. The FBI did have a record of his visits with Boris, and the FBI agents assumed (hat Stapler, having realized that the FBI must have been watching, was try ing to divert suspicion by claiming he was working for rhe CIA. Hie FBI insisted that they had checked with the CIA. which denied having any employees named George Brennan and Kenneth Brauer.

It took several years for the case to work through the court system. The CIA insisted in response to court summonses (hat they had no employees by the name of George Brennan and Kenneth Brauer, nor did they have any record that Lester Stapler had every performed any service for the CIA while in Mexico City. A belated check with Stapler s bank uncovered that the payment he had received had been a cashiers check drawn on a Mexican bank and the source could not be traced.

While the FBI remains convinced that Stapler was a walk- in whom the KGB rejected, others in the intelligence game

CASE STUDIES

189

 


have concluded that Stapler was rhe victim of a very clever fake-flag setup.

The men Stapler knew as George Brennan and Kenneth Brauer may have been Soviet intelligence case officers, or (hey could have been case officers working for any of a dozen other intelligence services. They could have even been spy. ing fur one of the several different antigovernment groups that are constantly criticizing U.S. intelligence agencies.

Whoever they were, they had no doubt targeted Stapler with rhe intent of learning everything he might tell them about his work with the DIA. When they discovered he was going to Mexico City on a business trip, they saw it as the per¬fect opportunity. Using false ID, they had set up an office where they could produce what looked to Stapler like official embassy telegrams. The supposed embassy number they gave Stapler was a front manned by some woman who had probably never been near the real U.S. Embassy. The long sessions in which Stapler thought he and the two CIA han dlcrs were determining what he could and couldn’t tell a Soviet intelligence agent about his previous work were really opportunities for the twu fake CLA case officers to learn just about everything about DIA analysts that they could.

WHY RECRUIT A HOTEL MAID?

Sometimes access agents can be as important as a primary agent might be in other circumstances. Charlene Brevis was the night housekeeper for a commercial hotel in a major midwest- ern city Charlene was also a single mother who had three teenaged children. When her only son died as an innocent vic¬tim in a drug shoot-out. Charlene joined a parents’ organization that was campaigning for sưicter enforcement of drug laws.

About six months later. a man named Ray Kelleher start¬ed attending the meetings and introduced himself to Charlene. After a couple more meetings. Ray focused the kind of attention on Charlene that suggested a possible

190

RUNNING A RING OF SPIES

 


romance. Ray didn’t talk much about himself bur did listen sympathetically as Charlene talked about her dead son and her hopes for college educations for her two daughters.

The night they became lovers, Ray told Charlene that he was an undercover agent for the state police narcotics squad but asked her to keep that information confidential. As their romance blossomed, Ray often talked about the frustrations of his job and how difficult it was to get evidence on kingpin drug dealers. He confided that he and his colleagues had learned that several big drug dealers often checked inro the hotel where Charlene worked. Ray was certain that the deal¬ers were discussing major deals in their hotel rooms. Ray sug¬gested that if there was only some way to sneak into the rooms where the drug dealers stayed, he might be able (0 find evi¬dence or plant a microphone to gather such evidence. Unfor¬tunately. without doing that, he couldn’t even gather enough evidence to ask for a legal search or phone tap warrant.

Because of Charlene's anger about drug dealers, Ray didn't have too much trouble convincing her during the next several weeks that she could do a real service for the war on drugs if she would provide Ray with pass keys, which would allow him access to any room in rhe hotel that he suspected was being used by drug dealers.

Although Ray warned Charlene that she must keep her help a secret, he also told her he had arranged with his supe¬riors to list Charlene as a confidential informant and she would be well paid for her assistance. Charlene began loaning Ray a set of pass keys almost every night, and she also started putting substantial amounts of money into a special bank account (hat would eventually help ensure her two daughters grit a chance to go co college.

Several weeks later, Ray showed Charlene a newspaper story reporting the arrest of a major group of Colombian drug traffickers engaged in a money-laundering scheme. Ray claimed the arrest was the direct result of information he had collected from the hotel room where one of the conspirators

CASK STUDIES

191

 


had stayed. After that, Ray continued to point out occasional news stories of big drug buses, which he claimed had resulted from Charlene s cooperation.

Ray Kelleher's real name was Steven Kissman. and he was not a police officer, ỉn fact, he had a police record «1$ a confi-dence man. The only thing he knew about the drug cases he claimed (0 have helped solve was what he read in the papers. He and several other colleagues had found a new profession in industrial and commercial intelligence. What he really was after was access to the notebook computers so many business executives carry with them whenever they travel.

Ray would use the pass keys Charlene provided to enter (he hotel rooms of business travelers while they were dining, taking in the city’s entertainment, or even sleeping in their hotel rooms in the early morning hours. Ray carried his own notebook computer along on his forays, which he would use to download the contents of any notebook com¬puter he located in a guest’s bedroom, ơn those occasions when the businessman was sleeping in his bed, Ray would take the computer out of the room to an empty room where he would cruise through the flies and download key data before returning the computer to the owner's room. Ray and his colleagues would then go over the data, identifying information that could be sold co foreign competitors of the U.S. business corporations.

Eventually. Ray s luck ran out: one of his victims woke up while he had her computer in another room. Finding char she couldn't go back to sleep, the woman decided to do some work and discovered that her computer was missing. The city police investigated the theft, and Charlene’s company spent significant amounts of money on private detectives hut were unable to recover the computer or discover who had taken iu

Charlene, however, immediately figured out who must have stolen the computer. When she confronted Ray, he admitted that he had taken it but pointed our that if he were caught, she would go down with him. The sizable bank

192

RUNNING A RING OF SPIES

 


account Charlene had accumulated would convince any jury that she was pan of the gang.

Charlene still works for Ray, but no longer shares her bed with the lover turned blackmailer. He still pays her for her services, but not nearly aS much as when she thought she was working with the nares. She is not the only hotel employee in the city working for Ray and his partners. In each ease, the team used a different scheme in recruiting someone who could give them access to the rooms of businessmen traveling wirh notebook computers filled with data.

CATCH A MAN WHEN HE'S DOWN

Wilber H. Schott worked as an engineer for Eden Electronics Production. 3 large government weapons contrac¬tor. Schott, whose work involved the design of such high-tech wcapons-guidance systems as those demonstrated during the Gulf War. had a top-secret I'.s. government security clear¬ance. After 20 years on the job. Schott failed to get the pro¬motion he had expected, mainly because his personal life was falling apart and impacting his work performance.

In his early 50s, Schott soon found himself newly divorced with financial troubles that forced him to flic personal bank- luptcy. Reduced to living in a rented efficiency apartment while he worked at a job with little hope of promotion, his only recreation was an occasional game of tennis played on the apartment complex's tennis court. It was there he met Jerzy Kwasniewski, a Polish businessman. Kwasniewski played at about the same level as Schott, although Schott reg¬ularly won about two out of three games.

After a couple of weeks, Schott invited Kwasniewski up to his apartment after a game for a couple of beers. Prom there, their relationship developed into a friendship with lots of tech-nical talk about developments in electronics and the efforts of Poland to find potential customers for some of the new prod¬ucts Polish industry was manufacturing. When Kwasniewski

CASK STUDIES

193

 


asked Schorr ro write down a list of possible U.S. customers ro whom Kwasniewski might try to sell, Wilber agreed co do so.

A couple of weeks later, Kwasniewski knocked on Schon’s door and excitedly announced that rhe information Schutt provided had resulted in a substantial sale. Kwasniewski then insisted on paying Schorr a finder’s fee for the information that had made the sale possible.

Schon had been trained as parr of his employment co rec-ognize hostile intelligence activity. He chose to ignore the obvious signals and happily accepted the cash payment, which he spent on back rent and a couple of much-needed new suits. Over the next several months, Kwasniewski paid Schott fees for similar kinds of inconsequential information and reports OH six different occasions. Each time the fees increased in size. Initially, Schott used the money ro pay for necessities, bur eventually he had a bit left over to pay for lux¬uries. including a return to the dating game.

Shortly after Schott began seriously daring a woman with two young children. Kwasniewski asked to see some unclassi-fied but sensitive material on radar fire control for tanks to which Schott had access. Claiming he wanted the information so he could advise his home office on possible areas in which ir should direct research projects, Kwasniewski promised a Substantial payment as a consulting fee for good information.

Schott thought it over for a few days, then copied the material from company flics and passed rhe information on ro Kwasniewski. The payment he earned was enough to allow .Schon to buy a small engagement ring and propose marriage to the new woman in his life.

From that point, ir was an easy task for Kwasniewski to ask for confidential and eventually secret information. Schott knew what he was doing but kept telling himself that as soon as he got set financially, he would cut the relation with Kwasniewski, who was already talking about an expected transfer back to his home office in Poland, a transfer that Schott assumed would end the relationship.

194

RUNNING A RING OF SPIES

 


When Kwasniewski did ger rhe promised transfer, he pro-posed chat he give Schott and his new wife a belated honey-moon trip to Innsbruck. Austria, in appreciation for the great help that Schorr had given him during his stay in rhe United Scares. In Innsbruck. Kwasniewski spent three days showing Schott and his wife (he tourist sites.

On the fourth day, Kwasniewski invited Schon to a final tennis game at a local club while Schott’s wife went shopping. While they were playing on a private court, a man whom Kwasniewski inưoduccd as the person who would be replacing him as Schott s contact appeared. When Schott discovered that Kwasniewski expected that he would continue to turn over classified information on weapons systems to (he new control. Schott angrily insisted that he had no intention of doing so

Al (hat point, rhe new control officer, who had none of Kwasniewski’s subtlety, pulled our of his pocket an envelope and spread out a collection of pictures showing Schott s new stepchildren. The first pictures had been taken as the chil¬dren walked away from the home of a neighbor where (hey were staying while their mother and new stepfather enjoyed the sights of Austria. The scries of pictures followed rhe teenaged children to school and to some extracurricular activ¬ities after school.

The new control officer (hen grimly announced that nor only was Schorr going to continue providing information, but that he was going to spend (he last two days of his Innsbruck vacation undergoing some intensive training to make him a more useful spy. The new control officer suggested that Schorr suddenly suffer a flu attack. Kwasniewski would then take the wife on some tours while Schott stayed in the hotel room and “nursed his flu” while the training took place.

At the end of the training session, (he new control officer rewarded Schott with a $7,000 payment for his good behavior just before the Schotts boarded the plane co return home. He also provided Schott with detailed requests for specific infor-mation he wanted, as well as instructions for how to pass such

CASK STUDIES 195

 


information on through. Schott continued to pass information to the Polish intelligence senice for several years. He was paid well for the information he provided, but he was spying more out of tear than greed.

Schon fit all the classic profile characteristics of a highly recruitable spy: marital problems that ended in divorce, finan¬cial problems, job dissatisfaction, an open friendship with 3 Soviet bloc national—all followed by sudden, unexplained wealth and frequent foreign travel. (He. his wife, and some¬times the two teenagers made several more trips to Innsbruck over the next few years.) But no U.S. spy-catcher unearthed him. A Polish defector eventually turned Schott in.

KNOCK HIM DOWN AND PICK HIM UP

After 15 years with rhe DEA, Wayne Kramer considered himself to be a hard-charging special agent on the promotion fast track. Assigned to a special money-laundering task force in South Florida. Wayne was tasked with dealing with a number of state law enforcement officials as well as several high-ranking executives in the banking community who were cooperating with law enforcement to spot money-laundering operations.

In his spare lime, Wayne and his wife were also active in 3 church group engaged in diug cducanon activities aimed at high school students. While working with the church group. Wayne met Robert Shanklin, who had recently moved to Florida after retiring from a job as a deputy prosecuting attorney in a northern state. Despite the differences in their ages, the two men developed a mutual friendship because of Shanklin's strong advocacy of federal drug-enforcement programs.

During one of their conversations. Wayne confided in the older Shanklin that he was expecting to be promoted to the posi-tion of task force director when the current director got his expected promotion to the DEA's Washington headquarters.

A month before the expected promotion was ro be announced, a Florida State Police agency discovered evi-

196

RVNMNC A RING SPIES

 


dcnce while investigating one of their cases that implicated Wayne Kramer in a money-laundering scheme. Kramer angri¬ly proclaimed his innocence, but the investigation into the charges took several months, during which lime Kramer was placed on administrative leave. Another officer got the pro¬motion that Kramer thought would be his.

The federal investigation failed to find enough evidence to convict Kramer, and he was eventually returned to full duty with no loss of pay. Kramer and his wife, however, had to take out a second mongage on their home to pay for the legal ser-vices Kramer employed to help prove his innocence.

As IS so often the case in such situations, upon his return to duty. Kramer found that many of his colleagues still thought he was guilty. Although he still had 3 job on the task force, Kramer was working for a supervisor he considered incompetent. Worse, he knew he would never get another promotion. 'ITiC only reason he stuck it our was because he would be eligible for early retirement in seven years.

Through the hard times, the one friend who stuck with Kramer was Robert Shanklin. Shanklin nut only insisted that he believed Kramer to be innocent, he loaned Kramer money for legal fees and helped him find the attorney w ho eventual* ly got the charges dropped.

Shortly after Kramer returned to duty, Shanklin suggested that the person who had tried to frame Wayne was probably a jealous colleague who had sold out ro rhe drug lords. Shanklin proposed that he (Shanklin) begin his own private investiga¬tion, using his considerable experience as a prosecutor ro find out what happened.

At Shanklin’s suggestion, the two men started examining every one of Kramer s colleagues who had worked on the task force prior to the discovery of the evidence that seemed to implicate Kramer in a drug deal. Shanklin assured Kramer chat if they kept digging into each person’s caseload, they would eventually discover something that didn't match up— perhaps a sure ease that suddenly fell apart, an investigation

CASE STUDIES

197

 


that turned sour, or even some evidence of unexplained wealth by a colleague.

Kramer knew that he was sharing with Shanklin a great deal of information on ĐEA personnel, ongoing investiga¬tions. and even the identity of confidential informants, but Kramer was so determined to discover who had framed him that he felt justified in accepting Shanklin's help and provid¬ing him all information needed for the investigation.

After several months of such activity. Shanklin told Kramer that he was increasingly convinced that the colleague who had gotten the promotion Kramer had lost was a dirty cop who had deliberately framed Kramer SO he could cover his own tracks as well as get the promotion. Shanklin suggested that the dirty cop was now using his position as the director of rhe task force to protect the crooks who paid him off while taking rhe competition out of circulation.

Kramer did not immediately go to his superiors with Shanklin’s evidence; instead Shanklin and he started planning how they would catch the new task force director with his hand in the till. Looking for 3 scheme that would trap the suspected dirty cop, Kramer shared even more confidential information on active eases, hoping to spot a case where the dirty colleague had ripped off one of (he drug dealers of a pending arrest.

Suddenly, in 3 single week, several of the task force's major cases went sour. Three prime witnesses, including a high-ranking bank officer, were gunned down in gang-style killings, five suspects targeted for arrest suddenly left the country, and w hen the task force served a search warrant that was supposed to catch major evidence based on w iretap infor¬mation. they found nothing.

Every agent on the task force suddenly found himself answering tough questions as the supervisors tried to identify the source of a major information leak. Wayne, assuming rhar somehow his "crooked" supervisor had discovered the plan that Shanklin and he were about to put into play, ưied to con¬tact Shanklin to discuss what they could do next- Shanklin

198

RUNNING A RING OF SPIES

 


didn’t answer his phone, and when Kramer checked out the condo where he lived, no one answered the door.

Badly shaken. Wayne found himself once again a primary suspect in rhe investigation. When Wayne failed a lie-detec¬tor test question about whether he had ever revealed confi¬dential information to an unauthorized source, he tried to explain to one of the DEA’s internal affairs investigators exactly what Shanklin and he had been doing. A subsequent investigation discovered that there was no such person aS Robert Shanklin and certainly no evidence that the new cask force supervisor had been dealing with criminals.

The investigators eventually concluded that Robert Shanklin was working with a major Colombian drug traflick- ing group, which had deliberately set out to infiltrate the DEA money-laundering task force. Shanklin, or someone with whom he was working had probably planted the evi¬dence that cost Wayne Kramer his promotion—probably because at that time Kramer and those under his supervision were all found to be incorruptible. Then Shanklin—who already had Kramer convinced of his false identity—moved in. pretending to be the friend in need.

Shanklin s skill in pretending to be a retired prosecutor suggests that he may well have worked as a prosecutor at some time under another identity. He had likely been recruit¬ed by the drug cartel at that point and had continued to work for them after retirement.

Shanklin didn’t share the information he tricked out of Kramer with everyone, only with a select group of traffickers and money launderers who worked for one segment of the Cali Cartel. (The task force still got a number of convictions.) In effect, the cartel got a double bonus: they escaped prose¬cution and put the competition out of business and in the can.

Kramer’s supervisor decided that rather than go public with what Kramer had done and prosecute him for leaking confidential information, the cask force would take the credit for the drug dealers and money launderers they did catch and

CASE STVDIES

199

 


not tell anyone about the bigger fish char got away because 3 clever drug cartel intelligence agent first knocked Kramer down and then picked him up.

Kramer was even permitted ro stay on with the agency, although he was transferred to a small office along the (Ùliíomia/Mexico border. Six months afrer his transfer, Kramer was killed while working undercover in a buy-bust investigation.

200

RUNNING A RING OF SPIES

 


Conclusion

The Successful spy

Y

ou will never read about successful spies in rhe

newspaper or watch them being interviewed on

TV talk shows. Only failure makes a spy famous.

Success guarantees that the public will never know the spy's

name—and neither will the victims who suffered the results

of his efforts.

.Around the world, every day, thousands of men and

women go to work planning to steal the most valued thing

with which they are entrusted: the secrets of their employ-

ers, fellow citizens, and friends. Their victims often believe

these traitors to be exemplars’ employees, loyal confeder-

ates, and faithful friends. Most of the time, the traitors will

spy for years, even decades, without ever being discovered

or even suspected.

The vast majority of those who become successful spies

never planned or expected to become traitors. They took the

jobs that positioned them $0 that they had access to valuable

secrets, expecting to work their careers out as loyal and hon-

est employees. Many will even deny the accusation of trea-

son. insisting that they were forced to take the only course of

action possible because others betrayed them, took advantage

of them, or denied them a fair shake in life. Even those who

201

 


admit that they have turned traitor will offer complicated excuses for why their actions arc justified.

The case officers who turned them into traitors knew how ro help them find that justification. Behind every successful spy is a successful intelligence case officer who deliberately conned the person into becoming a spy. Good case officers never see their names in the newspaper either.

Yet. the key to spying success is not the spy or the case officer who recruits the spy. in the final analysis, every suc-cessful spy owes his success co the person upon whom he is spying. Just like thieves thrive when people arc careless with how they protect their valuables, so, too, do spies thrive when people are careless with the way they protect their secrets.

Most readers will never have any reason to recruit a spy. Intelligent, strong, self-reliant, courageous, and competent people don't have to steal secrets to survive and prosper while defending themselves from aggressors. If you have an enemy on rhe border, the way to make sure he never attacks is not to steal his plan of attack. Instead, you must arm and prepare to defeat any attack that the aggressor might launch and rhen let him know exactly how strong you are. If you don’t picparc chat kind of defense, then stealing every one of your enemy’s secrets won’t save you from disaster.

If a business competitor is outperforming you, the answer IS not to steal his secrets; it’s to better serve your customers and keep them coming back. If you want to beat a political opponent, the answer is not waging dirty tricks, lying cam¬paigns. or hiring petty criminals to break into your rivals office; it’s taking a logical stance on issues, offering simple explanations, good advertising, and the courage to be honest with the voters. If you have a personal relationship with a lover or 3 partner that has degenerated to the point that you must spy on that person—or worse, you fear that he may be spying on you—it has already failed and the best thing you can do is end it as quickly as possible.

The paradox is that the more competent, clever, and suc¬

2Ơ2

RUNNING A RING OF SPIES

 


cessful you become in business, social relations, government politics, or your personal life, the more likely it is that some¬one will set out to Steal your secrets of success and use that information to destroy you. If you are really good at what you do, your enemy will not succeed in defeating you, even if he succeeds in stealing your secrets. More likely, you won't have any scorers worth stealing. The strongest, most successful people in the world live their lives as open books, caring not a whit about keeping secrets. Indeed, they waul the world to know how strong they are.

However, many of you may not have that strength of char-acter, and you do have secrets you think you need to keep. If your enemies succeed in learning what you want to keep hid¬den from the world, their successful spying will cost you money, pain, worry, frustration, and even defeat. It is for you that this bouk is really written. The more you know about how spies are recruited, the better prepared you will he to rec¬ognize the spies within your own ranks and neutralize them or even turn them against the people who recruited them.

The person who successfully spies on you will not he some funny-looking stranger or someone who openly chal¬lenges your authority or makes his dislike for you obvious. The person who spies on you will he someone you trust. It may be your secretary, your most faithful employee, your good friend, or even your lover.

If you have a traitor in your midst, the thing you must understand is that something went wrong long before the spy master came along and convinced that person to betray you. Good case officers must have human material to work with. The best way to protect against the spy is to make sure that rhe only people who have access to your secrets are people who have as much to gain by keeping those secrets as you do.

Whether you arc running a country, a business, a criminal enterprise, or a political movement, or just living well on your own hard work, here arc a few things you can do to make sure someone you trust doesn’t listen to (he siren call of treason.

THE SIXXJESSH.L SPY

203

 


accept people based on vthat they, or others, say they are. Find out what they have done. Whether you are hiring an employee, accepting volunteer help in a political action group, or starting a friendship or a love affair. thoroughly check out the background of everyone you must trust, The things that count are not letters of recommendation, rhe praises of peers, or the fawning adulation of rheir friends, but credit records, school records, court and criminal records (or. better said, rhe lack of Such records), and past successes or failures in sports, business, employment, and personal living.

Past behavior is no guarantee of future behavior. No matter how sterling someone's background or past work perfor-mance. watch for evidence that doesn't track with what you already know. Decide based on what people do today, not what they did yesterday, and certainly never what they say they will do tomorrow.

bo not rely on quick fixes such as polygraph examinations, scheduled security clearance updates, surprise audits, surveil lance cameras, or electronic eavesdropping as a means of revealing spies.

Be security conscious and educate those you trust on hox intelli¬gence case officers recruit Spies. Offer substantial rewards for anyone who reports a possible approach by an enemy espionage officer.

Don't identify your ossn counterespionage officers. (You don’t have a counterespionage officer? If you keep valuable secrets, you want someone on the payroll whose job it is to guard those secrets.) Don't put those charged with coun-terespionage in the security office that looks after the physical and personal security of the building and the employees. Counterespionage officers should work under cover as personnel officers, special assistants, legal aids, morale officers, or any other title that allows them to move easily among your employees and gather information with¬out anyone suspecting what they are really doing.

2(H RUNNING A RING OF SPIES

 


Learn as much about your employees vho have access to your secrets as any enemy case officer could learn. Your counterespi¬onage officers should look at every employee with access to secrets on a regular (but random) basis by using the same techniques that a recruiting case officer would use. That means secret surveillance that neither the employee nor anyone except you and rhe counterespionage officer knows is going on. (Sure, that’s expensive, but if the CIA had been doing that instead of trusting in lie detectors. Rick Ames would have been caught in the first year he started spending the extra money he earned by spying for the KGB.)

Don't keep things secret that don't have to be kept secret. Know what is vital intelligence that must be protected and restrict access to such information only to rhose who need to know.

Develop sound personnel practices that reaỉard effort, creativity, and loyalty. Make sure they reach down to the little people who arc such an attractive target for spy recruiters. .Anyone with access to secret material or areas where secret mater¬ial is held should be paid extra money for the trust you place in them. Secretaries who type up secret documents should make as much as college-educated company exec-utives and should be treated with the same respect.

Don't keep disgruntled employees on the payroll, especially employees vho feel they haven’t been treatedfairly. If you can't promote the man who thinks he deserves 3 promotion, fire him. Don't leave him in place.

Don't keep arty employee in a position that gives him access to secrets if he develops any vices or habits such as alcohol or drug abuse, credit problems, dangerous or offens ive sexual behavior, or personality disorders. (This flics in the face of the modern idea of vice as a disease, but tolerance for bad behavior is one of the primary reasons why American intelligence agencies lost the spy war.)

lie tolerant of unusual or different behavior that does not impact

THE SIXXESSPL’L SPY

205

 


on job performance or the employees personal relations. Don’t fire the open homosexual who lives quietly with a partner. Do fire the married man who cheats on his wife every chance he gets, lies to her and his colleagues about what he is doing, and uses his work as a cover to get away with it.

Of course. following these rules w ill not guarantee that no one will ever steal your secrets. But real life has no guaran-tees—something that every good case officer knows. He takes the human marcrial he finds, and he manipulates it into some-thing he can use. You can do rhe same, whether your are try¬ing to recruit a spy or make sure your employees, friends, and lovers stay faithful to you.

206

RUNNING A RING or SPIES

 


Không có nhận xét nào:

Đăng nhận xét