Handler (spying)
   HOME

TheInfoList



OR:

In intelligence organizations, agent handling is the management of so-called agents (called secret agents or spies in common parlance), principal agents, and agent networks (called "
assets In financial accountancy, financial accounting, an asset is any resource owned or controlled by a business or an economic entity. It is anything (tangible or intangible) that can be used to produce positive economic value. Assets represent value ...
") by
intelligence officer An intelligence officer is a person employed by an organization to collect, compile or analyze information (known as intelligence) which is of use to that organization. The word of ''officer'' is a working title, not a rank, used in the same way a ...
s typically known as case officers.


Human intelligence

A primary purpose of intelligence organizations is to penetrate a target with a human agent, or a network of human agents. Such agents can either infiltrate the target, or be recruited "in place". Case officers are professionally trained employees of intelligence organizations that manage human agents and human agent networks. Intelligence that derives from such human sources is known by the abbreviation
HUMINT Human intelligence (abbreviated HUMINT and pronounced as ''hyoo-mint'') is Intelligence (information gathering), intelligence gathered by means of interpersonal contact, as opposed to the List of intelligence gathering disciplines, more technical ...
. Sometimes, agent handling is done indirectly, through "principal agents" that serve as proxies for case officers. It is not uncommon, for example, for a case officer to manage a number of principal agents, who in turn handle agent networks, which are preferably organized in a cellular fashion. In such a case, the principal agent can serve as a "cut-out" for the case officer, buffering him or her from direct contact with the agent network. Using a principal agent as a cut-out, and ensuring that the human agent network is organized in a cellular fashion, can provide some protection for other agents in the network, as well as for the principal agent, and for the case officer if an agent in the network is compromised. Assuming that standard principles of intelligence
tradecraft Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern espionage (spying) and generally, as part of the activity of intelligence assessment. This includes general topics or techniques ( ...
have been strictly observed by the principal agent and the agents in the network, compromised agents will not be able to identify the case officer, nor the other members of the network. Ideally, agents may work side by side in the same office, and conduct their
clandestine Clandestine may refer to: * Secrecy, the practice of hiding information from certain individuals or groups, perhaps while sharing it with other individuals * Clandestine operation, a secret intelligence or military activity Music and entertainme ...
collection activities with such discipline, that they will not realize that they are both engaged in espionage, much less members of the same network. Since an agent can sometimes identify his or her principal agent, however, or reveal information under
interrogation Interrogation (also called questioning) is interviewing as commonly employed by law enforcement officers, military personnel, intelligence agencies, organized crime syndicates, and terrorist organizations with the goal of eliciting useful informa ...
that can lead to the identification of a principal agent, the protection provided by cellular network organization can be time-sensitive. If principles of intelligence tradecraft have not been strictly observed, it is also possible that compromised agents can reveal information that exposes other members of the network. In the real world of espionage, human lapses are very much the norm, and violations of the principles of tradecraft are common. It is for this reason that agents are ideally trained to resist interrogation for a defined period of time. If an agent is able to resist interrogation for a defined period of time, the odds improve that other members of the network can be alerted to the compromise.


Case officer

A case officer is an intelligence officer who is a trained specialist in the management of agents and agent networks.case officer
thefreedictionary.com, retrieved 4 March 2009 Case officers manage human agents and human intelligence networks. Case officers spot potential agents, recruit prospective agents and train agents in
tradecraft Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern espionage (spying) and generally, as part of the activity of intelligence assessment. This includes general topics or techniques ( ...
. Case officers emphasize the elements of tradecraft that enable the agent to acquire needed information, and enable the case officer to communicate with and supervise the agent. Most importantly, case officers train agents in methods of avoiding detection by host nation counter-intelligence organizations.


Agents, spotting, and recruitment

By definition, an "agent" acts on behalf of another, whether another individual, an organization, or a foreign government. Agents can be considered either witting or unwitting, and in some cases, willing or unwilling. Agents typically work under the direction of a principal agent or a case officer. When agents work alone, and are not members of an agent network, they are termed "singletons". The identification of potential agents is termed "agent spotting" (also termed "talent spotting"). Identifying potential agents, and investigating the details of their personal and professional lives, involves the granular verification of their
bona fides In human interactions, good faith ( la, bona fides) is a sincere intention to be fair, open, and honest, regardless of the outcome of the interaction. Some Latin phrases have lost their literal meaning over centuries, but that is not the case ...
. Such activities can include uncovering personal details that leave potential agents vulnerable to
coercion Coercion () is compelling a party to act in an involuntary manner by the use of threats, including threats to use force against a party. It involves a set of forceful actions which violate the free will of an individual in order to induce a desi ...
,
blackmail Blackmail is an act of coercion using the threat of revealing or publicizing either substantially true or false information about a person or people unless certain demands are met. It is often damaging information, and it may be revealed to fa ...
, or other inducements, such as sexual approaches. Approaches to potential agents can be multitudinous and considerable time can pass before the potential agent is maneuvered into a position where a recruitment "pitch" can be hazarded.


Training

Agent training often includes techniques of tradecraft such as clandestine
communication Communication (from la, communicare, meaning "to share" or "to be in relation with") is usually defined as the transmission of information. The term may also refer to the message communicated through such transmissions or the field of inquir ...
, including
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
, the use of
one-time pad In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a ran ...
s, the construction of
concealment device Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is tha ...
s, and the employment of
dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals ca ...
s. Other elements of tradecraft include elicitation,
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
and
countersurveillance Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is ...
, photography and the emplacement of audio devices, sensors, or other transmitters. Case officers generally train agents one at a time, in isolation, including only those elements of tradecraft needed to penetrate the target at hand. Case officers will also teach agents how to develop ''cover for status'', and ''cover for action'', meaning how to establish credible pretexts for their presence and behavior while engaged in collection activities. A well-trained and competent agent can conduct his or her clandestine tasks while under close surveillance, and still evade detection. More advanced agent training can include resistance to
interrogation Interrogation (also called questioning) is interviewing as commonly employed by law enforcement officers, military personnel, intelligence agencies, organized crime syndicates, and terrorist organizations with the goal of eliciting useful informa ...
.


See also

*
Minder A minder is the person assigned to guide or escort a visitor, or to provide protection to somebody, or to otherwise assist or take care of something, i.e. a person who " minds". Government-appointed persons to accompany foreign visitors are of ...


References


External links


''Human Intelligence: From Sleepers to Walk-ins''
Thomas Patrick Carroll, Syllabus, 5 September 2006 – 24 October 2006—many good definitions with historic examples and timely discussion of problems; in outline form. {{intelligence cycle management Espionage Spies by role