![]() |
![]() |
||||||||||||
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
|
![]() |
![]() |
------------------------------------------------------------ BRANCH I DIR. HAT E [page 1] BRANCH ONE HATTING LETTER 8601 Got(?) 7/8/77 For quite some time now, we in the C of S have had the problem of contending with government and other agency infiltrations of our organizations. Most of the time this occurs it is due to the fact that these agencies have a desire to obtain some of our files which they think will help them in looking for whatever it is that they mistakenly think we are trying to hide from them. Since one of our primary functions in the GO is that of security for our organizations and individuals, I thought it necessary to describe to you how some of these agencies and agents work. With this data you may more easily identify one of these infiltrators and predict the presence of one. There are also included some things to look for which will help you to identify the presence or work of one of these professionals. This data was taken from a number of books read on the subject, as well as personal interviews with agents who have done this kind of work, and this data reflects much personal experience. Some is in actual excerpted form, but the majority of it is a summary of data this far learned on the subject. "There are some very basic principles and techniques to be employed for the activity of obtaining files from a target area. These should be well known by all as files from a target area have proven to be the best and most reliable source of data, and these techniques will invariably produce those files. When considering how to obtain files the prime consideration should be that of safety for the operatives, the mission assignment, the case officer, the network, and the employing organization. Exposure, having one's cover blown, shows that there was weakness and outness in one's over, and that someone failed to predict and adequately cover for the situation that "Blew" the agent. It may also mean that the agent was sloppy, careless, insufficiently trained or briefed, or didn't follow the instructions or cover. RULE: A cover should always be good enough to withstand the failure of the operation, and on top of that the Case Officer must insure that the operation and the operative do not fail. On light cover cycles, ie a suitable guised phone call, a blown cover is rarely dangerous although it can be very embarrassing, and usually blows that approach, but in a files type of operation it can prove disastrous to have one's cover blown. Covers may not always be able to be air tight, but working towards that goal is the best safety factor for all concerned. Countering the safety factor is the time element and need for the desired data. The need for the data and its importance to the employing organization will sometimes place the agents in a riskier position than if they had the time to plan an air tight cover. Therefore, what must be known by every agent and case officer is that if they are blown "they must take full responsibility for the actions, and never let it be known that there is an employing organization.". This can be done by giving another cover story like "I wanted to do this thing myself so I could get my name in the press" etc. So, we see that the time element and need for the data must be weighed against the safety of an air tight cover, but that whatever the case may be the employing organization must be protected from exposure. Keeping these basic intell principles in mind, we move to some methods involved with obtaining files. [page 2] In determining how to get these files, one always tries for the safest approach to the target, checks it out for its workability, and from there proceeds to the riskier approaches, after the safer ones have failed. CASING: In all types of files operations, a thorough casing of the target area should be done. Casing means going down to the place and finding out what type of obstacles are in one's way, prior to the actual approach to obtain the files. Classically, casing is looking at the building, office, home etc, finding out if there are any guards, and if so where, and when, how do they handle people they are not familiar with, security procedures they may use, their time schedules, and their rounds if they make them. It means to look for hidden cameras, observe all entrance and exit points, look for burglar alarms, find out what kind of locks are on the doors one wants open, the locations of a central key box or ring, the flow lines of the organization, and anything else needed to know peculiar to the operation. Casing is a good thorough observation and inspection of the target area physically to learn of the obstacles so that one can successfully work around them, or utilize them if the need arises. One very easy method, used by professionals for finding out the full security details of an office bldg. is to call the bldg. manager as a prospective tenant. One can be calling for his boss to find out what kind of space is available for renting, if the elevators run regularly or are they shut down at a particular time, what security precautions are employed, guards? when? from what Guard agency?. can employees come in after hours, what type of Cleaning service do they have, maintenance service, alarm systems, identification cards, etc. Any of these questions are valid questions for a firm whose employees work late and sometimes have large amounts of cash on hand, and building managers are always happy to give out this data to a prospective tenant. It has been found that the case office will always go to the target area to physically inspect the area himself, not necessarily to conduct a thorough casing job, but to get a good idea of the physical surroundings so that he has a sufficient reality of the area which can be used when he is running the agent. The case officer, generally being more experienced, can often pick up some clues that the agent may have missed, and be able to recommend other approaches that an agent may not have thought about. Since office type bldgs. are of most interest to us, I will mention a few things peculiar to them. Office bldgs where more than one office or company reside invariably have a night guard, and/or an alarm system as security. Any bldg. where you cannot see a guard station at the main entranceway, nor can you locate a guard by knocking etc, and where there is not a night bell on the outside will inevitably have an alarm system wired up. ( NOTE: A night bell is a bell located on the outside of the bldg., and used by people who want to get into the bldg. but do not have a key to the main entrance way. The bell rings throughout the bldg. The guard will hear this bell and come to the entranceway to open the door. This system is generally used in conjunction with a sign in register where the person's name, time of entry, destination and time of departure are recorded, and sometimes the person's pass if the bldg. issues passes to the people who work there.) You can check your bldg. at night sometime to see if any of the above is used by the bldg. [page 4] Most professional agents are familiar with but are not experts in the field of security systems. This presents a bit of a problem for them in that they don't always know what to look for when looking for an alarm, and on top of that there are so many different types, styles and functions of today's security systems that it is virtually impossible to know all the things to look for about each one. This does not stop a professional, however, as he knows one very basic truth. All security systems can be worked around. These are employed to thwart the intruder, but if one belong [sic] there, ie are an employee of the bldg. or the office, or are thought to belong there by one who controls the security system, then the system presents little problem for that person. Even if this is not possible, many times by entering the protected area before the alarm is activated, and either leaving when another authorized person leaves or directly behind them, or by staying until the next day, well hidden, when the system is deactivated, the professional can have access to his target area. Another method of bypassing an alarm system known and used by professionals is to get someone inside who can turn the system off to do so in order to let one inside. This is accomplished by telling the guard or an office employee that one left his keys in the office, or forgot to lock his office door, or his office file. This gives one the time then to open the back door, and tape the bolt if necessary to gain access later, after having left in the expected manner, or to accomplish his task. There are some obvious things and standard ones which will always be looked for by the professional. The first and most obvious of these is a sign which tells all potential intruders that the area is protected by an alarm or security system. This sign is generally in plain view, and is used as a deterrent, but can also serve as a clue to the determined professional. It will state that an alarm system is hooked up and that the bldg. is protected by XYZ security agency. When one sees this sign, he can find out the details of how the security system works by making that simple call to the bldg. mngr. who in most cases will give the full details to show the prospective tenant how secure his bldg. is. The professional also looks for wires around the doorways, an unusual or out of place looking box on the side or over the door, a trip switch over the door, and tape lining eindows[sic]. If one can get a glance at the door when it is open, he can look at the inside edge where the door is hinged, and inside one looks for any buttons or switches that could push in and out or go on and off if the door were opened and closed. Many times the agent will not have the opportunity to examine the inside edge of the door until he is surreptitiously inside the bldg. of[sic] or office. In this case the professional will always check the inside edge of the door, and will also check around the entire edges of the door looking for a trip switch. He will also look underneath the entry door rug to check for wires or a sheet of plastic of any size which would be a pressure alarm. If the pro found any of these things after opening the door, he would immediately close the door, wipe off any prints, and immediately exit the bldg; trying not to be recognized. He would realize that he had probably set off a silent alarm, and this would be a point of interest to us in trying to catch one of these people in the act. As mentioned previously, the best way to beat the alarm systems is to have a good reason, permission or the authority to be inside the protected area. The alarm systems partially described can be used on interior office doors as well as entrance and exit doors. [page 5] Good agents are the key to any successful data gathering or other type of operation. A fair amount of time is spent recruiting and grooming agents, and building up a reserve of agents. That is the only way good intell networks operate as more than one agent can be used to infiltrate a place at one time, and there are always a diversity of qualified people appropriate for the network needs. Bad and troublesome agents will only serve to destroy the network and damage the employer agency in the long run. A note here is that many of the most successful actions in data gathering by agencies have been accomplished when repeated attempts by more than one agent going in on a number of different angles is attempted. This persistence and the covering of all approach angles has broken down the security boundaries of some of the tightest agencies in town. AGENT PLACEMENT AND UTILIAZTION [sic] Agents are of no use to anyone unless they are sent into a target area to produce some type of effect. Here we are mainly interested in the types of agents used for data gathering and files collecting. These are primarily the ones used against Scn., and are the one's [sic] whose techniques we should be most familiar with in order to stop, catch and expose them. The easiest and safest manner of gathering files and data is to place an agent directly inside the target area. This affords the agent a direct line into the area where the data is coming from. He or she can find out where files are, who is interested in them, where keys are kept to file cabinets. and where financial and personal data about the enemy people of interest is located. Being directly inside gives one a reason for being there (ie working late etc), the ability to by-pass guards and security systems, and generally a set of keys to the place, which can be copied and used later, as well as possibly giving the agent direct authorized access to the data of interest. Using this technique means that the exact target area is known about beforehand and that there is a job or opening of some kind near the person of interest who has the files or data needed. Although this technique is the safest and most workable, in many cases it is not feasable due to no hiring or no position open in the right area, or a greater need for personnel elsewhere. In this case, the next best alternative is actually inside the firm or organization itself, anywhere. This, generally, affords the agent the same type of accessibility to the info and to peripheral areas as the agent above. It puts a bit more of a strain on the agent as they are sometimes in a position where if they are caught outside of their area and inside the target area they would be suspected or at least attention would be brought upon them. This can be by-passed by having a good reason for being in the target area (ie my boss wanted me to pick up these files, or these are mine that were borrowed and I need them back, or have you seen my purse? etc). This should be a fairly real reason but does not have to be extravagant as people will dub in the most incredible things to make sense of a situation, it really has to be seen to be believed. People do not expect, nor in most cases can they confront the thought of having Intelligence operations run against them, and therefore come up with the most incredible reasons and dub in to explain intel activities. Establishing a pattern or working late is another workable technique. The agent works late, the bosses know this, thinks he or she is a good company employee, the agent waits til no one is around and goes about his business. The next best method used by these professionals, and one that has proven to be be extremely effective is to get someone in the bldg. where the target area is located. They uould apply for a job as a guard, a cleaner, a maintenance man or janitor for the bldg. itself. [page 6] A Case Officer only needs to learn what guard services cleaning service etc is employed by the bldg or how these people are employed, and by whom in order to get someone working there. This data can be gotten from the telephone call to the bldg. manager as a prospective tenant. This technique has proven workable for a number of reasons. One is that there is generally a high turnover of personnel in these guard and cleaning services which makes jobs fairly accessible. Two is that in most cases the guards and/or cleaners and janitors have keys to some or all of the offices in the building, and at the least know where the keys for the bldg. offices are located. In almost all cases these people will have the keys to the bldg, mngrs. office, and in this office one can inevitably find the master or duplicate keys to every office in the bldg. These positions will also give one the data about how the bldg security is run, who stays late, where, and alarm systems etc. If a cleaner or janitor cleans the exact office on the exact floor the target area is located in, and we thereby have a verified, permissable excuse to be inside the target area, some kind of cover story will be invented to cover the possibility of the agent getting caught with his hands in the till. The cleaner/janitor has a few minor drawbacks. One is that there is sometimes a boss they must report to periodically on the job, or who checks up on them periodically. This can cause some problems, but can always be worked around. The next is that there can only be a certain amount of time spent in the room generally, as other offices need to be cleaned by them and if they do not do this they will get fired. So, here they have agents who work quickly and efficiently if in the target area, and at a medium pace in all others. Cleaners/janitors positions have advantages that far outweigh their disadvantages because they can get easily inside and work, have permission to do so, have access to keys which can and will be copied, and can also let someone else inside to work while they stand some kind of watch. Even if by some chance the agents could not get inside they can always find out where all the master keys are kept, and then another method can then be devised to get them. Very often, this method will be for someone dressed as if they belong in the bldg., to go to the bldg. on a Saturday, Sunday, or Holiday, walk up to where the keys are stored, take the key off a hook, go to the office, open the door and have a field day perusing the files. This actually happened. The agent never caught. The guard position is equally good for the Pro. The guard will most definitely be able to give you the security precautions of the bldg. He will have, at least, keys to the entranceway and exit doors, and any alarm systems, which he can turn on and off at will. He works after the normal operating hours of the other offices in the bldg., and at a time when most of the other bldg. employees have gone home thereby having free access to the whole bldg. In most cases the guard will have access to the master keys to the bldg, or in the least he will be able to find out where these are located. (NOTE: Most states have fire laws which dictate that a set of master keys or duplicate keys for every lock in every room of the bldg. must be kept in a central location. This is so that a bldg mngr or someone can open the doors in case of fire if the tenants are not around. This means that most bldgs. have duplicate door keys somewhere on the premises. How about your offices?) In the case where the guard does not have all the keys, but knows where they are a method needs to be found whereby these keys can be gotten. This should not be difficult for professionals and usually isn't, as the guard/agent can let a whole crew of experts in the bldg. after hours to do whatever work they need to do and they have all night to do it in. This will most generally include locksmiths who are adept at not only "picking locks" but who can also cut keys to fit the particular locks in question. [page 7] The guard has the added benefit over the cleaner of having a good excuse for being inside an office bldg. He would most of the time say that he heard some strange noises and decided to investigate. He might have a hard time explaining why he's going through a particular file though, and this would generally be worked out before he did so. He could also stand guard while a cohort of his was inside doing the dirty work, and even if his cohort was caught, the guard would do his job and take the intruder from the person who caught him, under close guard of course for the purpose of taking him in to the police and the person could and would escape. Maintenance men in an area generally have the same advantages and disadvantages as the guard and cleaner. They do, however, have one thing over each. In many cases a maintenance man can go into an area in broad daylight to fix a desk, put down a door, repair a file cabinet, paint an office etc., and can authorizedally move the locations of people who work in the space. He also generally carries large tool boxes or supply carts and a file can just happen into one of these, be copied, and returned before anyone is the wiser. There are certain self evident disadvantages to this approach as well, The next approach down from the above methods is to place an agent inside the bldg., anywhere. This gives the agent the bare minimum of having a good reason to be in the bldg. and in most cases the wherewithal to by-pass guards and security systems. It has a primary disadvantage in that there is just about no good reason whv he should be in another office perusing files, nor should he be in the possession of another firm's files is checked by the guard on the way out of the bldg. A clever agent with a good cover story can pull off this type of operation. This approach gives the agent the opportunity to observe first hand the security measures of the bldg., to become friendly with the cleaners and guards, to know and possibly have copies of the make of keys used and locks, and to obtain an impression in either clay or wax of a master key to the bldg. from a friendly guard or cleaner. COMM LINES Very often it is not necessary for a professional to get inside the office surreptitiously in order to get the files or data needed. Finding out what business communication lines are used by the target area may produce the desired product. Businesses cooperate and communicate with any number of outside areas, and often times an agent in the right outside agency who has a line into the target area can obtain the desired files with as little as a phone call or a letter. At the least, in these cases, the agent can go to the target area and review their files on the subject. There is absolutely nothing illegal in this approach, even if caught but some resulting bad PR, and the loss of a job are consequences for the agent whose cover is not well prepared, and the possiblility of the employing organization being exposed could well result. Another approach, riskier, but one that still has some merit is to use the above tactics without actually being employed bv the neighbor agency. It vorks like this. Mr. Jones from the neighbor agency calls the target area and speaks preferably to a secretary or an underling. He says that he has sent Mr. Smith down to pick up their files on XYZ firm, and would they be kind enough to see to it that he gets the files quickly and returns to the office, or that he copies the files and returns quickly and returns etc. Then, Mr. Smith who is only minutes awav from the target area walks in, speaks to the same person just spoken to on the phone, tells the person that he is from the neighbor agency, and was sent by Mr. Jones to pick up the files they have [on] XYZ. The secretary will say something to the effect that Mr. Jones just called and relays the message of the phone call, and will generally produce the desired data. [page 8] This approach also bears the obvious risk that a wrong person is spoken to in the target area, or that a call would be placed back to the neighbor agency to verify the story. In this case the whole scene would be blown wide open. That is the reason for having Mr. Smith in or nearby the target area. This risk would especially apply if it is odd for the neighbor agency to be calling for this file, and so in all of the above cases where this approach is used, heavy investigation work is a prerequisite to the action. B and E's B and E stands for Breaking and Entering. This is a term given to a criminal act of physically breaking some object, ie window, door, lock, door jamb etc., for the purpose of gaining entrance to a particular area. It is a crime, a felony, and is almost _never_ used in intelligence gathering for the obvious reason that someone will find out that the area has been vandalized and call in the police and an investigation will ensue. This is stupid and is extremely bad intelligence as evidenced by the Daniel Ellsberg's psychiatrist's office break-in commonly refferred to in the press as a related Watergate incident. Not much time needs to be spent on this. If one sees his door knob on the floor, or sawdust in the doorway, or broken glass in his window pane, and further inspects to find a man with a pair of gloves on, and a crow bar and chisel in his hand, he calls the police and the game is over. On the other hand, a B and E is often times confused with an also illegal act called illegal entry. This is illegal, and a felony, and extremely risky, but at times presents itself as a good intelligence gathering technique. Illegal entry differs from B and E's in that there is no damage done to gain entry, and no tell tale signs are left behind to be discovered, so that entry can be made, the data gotten, and copied in some fashion (Xerox, camera, written down ) and then it is returned in its exact order to its place so that it is not noticed. If one suspected that his area had been illegally entered he could inspect closer and see some of the physical indications of such. In most office bldgs., an intruder has a guard to get around. This is done by either locating a back or basement entranceway. and either taking stairs or elevators up past where the guard is stationed. These entranceways can be checked for signs of entry, by checking to see if the door is open, looking for footsteps (in an otherwise untraveled dusty basement area), looking for tape on the edge of the door or residue from left over tape, or checking for jimmying marks on the door or around the wood where the door bolt is located. One can also check the sign in register to see if the intruder got around the guard in this manner. He would look to see if a person who signed the register did so in an unknowing manner, not using standard sign in-sign out procedure, or if there is a name on the register which doesn't necessarily belong there. This last though is rather difficult to determine as any reputable looking business man type can usually say to the guard he either works in the bldg., or that he's there to see Mr. John Doe who is in room 1408 etc. The guard lets him in, he wanders around and no one is the wiser. A check with the people in the office named by this stranger as his destination will occasionaIly produce an answer indicating that they know of nor expected no one of that name at their office. This still is not concrete evidence, since an unannounced businessman could have stopped by to see if anyone was in after normal working hours or on the weekend, but it does give an investigator an idea that he might take a closer look. Also from the guard a possible description of anyone entering the bldg. after hours or asking strange questions or not filling out the forms correctly might be obtained. [page 9] Guards will generally remember someone who comes in and either does not look like he belongs there, or does not act according to what the norm is, but they will also not pay too much attention to someone who knows the routine, and acts like he belongs there. Professional thieves and intelligence agents know this and study the normal routine first so as not to be conspicuous. So, if you're being hit by professional the guards be none the wiser. What does one look for if he suspects an illegal entry yet there are no outside entranceway clues, nor any from the guard and register. He looks at the doorway of the office. He looks at the lock and keyhole of the lock. He is looking for new surface scratches. These are sometimes produced by a careless lockpicking job, and are produced inevitably by one who will be cutting a key from a blank. Light scratches can often be covered up by moistening a fingertip and rubbing it over the scratched area, or by putting some soot, like from a cigarette lighter, on a fingertip, moistening it, and then rubbing it over the surface. The inside of the keyhole will also have small metallic scrapings left in it if the lock was picked using a "rake method" -back and forth motion of a lock pick inside a keyhole rapidly, or if the lock was a difficult one to pick. These scrapings are also unavoidable but unless one is looking specifically for them they will go unnoticed. Even when noticed the investigator has no clue as to when these were left there, and still needs more evidence. One could also check for fingerprints around the door knob area, on the door casing, and jambs, and on the nearby walls. But in these cases a professional will always wear gloves you say. True, but in many cases leather gloves are used, and these will produce dye stains and smudges if there has been any heavy friction between the gloves and another surface in the area. So, the pros will generally use surgical or rubber gloves which will generally leave no smudges. Credit cards are a handy tool for the pro if he has a door bolt to get to to open the office door. Credit cards are not illegal to carry (as is a set of lock picks), and in some cases the credit cards work as effectively as a lock pick. The credit card is wedged between the door and the doorjamb and slid either down or up to meet the door lock bolt. The bolt is usually shaped in a wedge shape and the credit card edge is slid up and down against the angled edge of the door bolt. This forces the bolt back into the door, and the door opens. This action, though, wears down the edge of a credit card and leaves tell tale shavings of white credit card material around the door bolt. A careful professional will clean these up but many are not that careful. (NOTE: This credit card routine will not work on a totally round or totally square bolt, nor on a door which has a dead bolt locking mechanism. If used on one of these bolts there is a good chance that plenty of white credit card scrapings will be left over.) Occasionally the door stop on the outside of the door will be removed with a chisel, screwdriver, or hammer to get a good shot at the space between the door and the door jamb. This will be difficult to replace exactly as it was and often the paint or shellac or varnish on the seams of the door stop will be ragged or broken off after this action has been attempted. This approach is generally not used as in most cases it leaves telltale signs and constitutes Breaking and Entering, and is bad intell procedure. Another form of illegal entry which is risky but at times extremely effective is this one. It is used occasionally by professionals who know their business and are pretty slick. The agent has to get inside the office, he has no keys and he can't quite get around the guard. He goes to the bldg. and stays inside the bldg. in a bathroom or somewhere else not being detected. Waits until closing time for the bldg offices or the end of the work day and leaves with the rest or the traffic. [page 10] During his exiting period, he will ask the guard for a match, wait around for a ride and get into a conversation with the guard. During this converation he will establish himself as a new employee of the bldg., and particularly of the target office, and he will ensure that the guard becomes familiar with his face. (This of course does bear the obvious drawback of being able to be identified.) This course of action will continue for a few days, until the conversation with the guard is flowing easily, or until the guard does recognize the agent with ease. Then, at the same time this is going on, telephone calls wili be placed into target office, after working hours to determine if anyone is there to answer the phone. This will be established by calling the telephone numbers of a number of different people wbo work in the office if there is more than one person or telephone in the area. This will give the agent and CO a rough idea of the time that the office people quit working and give them a good idea of the best times to enter the area and be undetected, Now when the preliminaries are worked out as best they can, the agent pulls his usual routine with the guard, and then suddenly remembers that he left his keys in the office, and that he forgot about the thing he has to have done for tomorrow's board meeting etc., and who has a key to let him in the office? The guard may, or a cleaner may, and this person lets the agent in the office. This agent has now successfully by-passed the guard and any security precautions or measures taken by the bldg. until he has to leave the bldg. The first action the agent would take while inside the office using this approach would be to make a thorough inspection of the office space to see if anyone was left working there late, and if he found such a person he would ask this person an innocuous question like, is Mr. Jones (an employee of the office) around still or do you know where XYZ firm is located, I'm lost and can't find this office etc. He would then leave with a thank you to the person who helped him with his problem and then go to the guard with a thank you, and the fact that he'll be taking his work home to work on. He can then try this same approach at a later date, Of course, once inside and alone, he can gather whatever data he'd like, copy it in whatever form, and return it to its place and leave, unscathed. He will of course have a good cover to handle the possibility that some employee of the office walks in on him during his handy work, and he will be just leaving as the person arrived. INSIDE THE OFFICE: Utilizing any of the above techniques will eventually get an agent into 90% of the areas they need to get into. So, now what does one do when inside and what do we look for inside the office. The careful professional is not going to touch, move or fiddle at all with anything he doesn't need to in order to get the desired data. In most cases he will be going directly to the files or the area where the data is located. He realizes that once inside, the least amount of time spent there is the safest procedure he can take. He is exposed to potential danger every second he is unauthorizedly inside, So, he will know what he is looking for, go straight for it, figure out the quickest method of obtaining it, the most expeditious and efficient means of copying it and getting it back in its place and then will do this. On top of this he will have as airtight a cover as possible to handle the possibility of his being caught. So, what clues does one look for. The professional will know that for every locked file cabinet there is inevitably a set of keys in a nearby desk drawer that will open the chbinets. This is generally a spare set of keys "just in case someonc else needs to get to the cabinets." This will probably be true of combinatlon locks. The combs will be written down in a nearby desk drawer, so someone else can open the lock if the original person gets sick or is out of work. So, unless the professional can pick these locks, which are [page 11] generally quite easy to pick, he will go thru desks in a search for these or he might go fooling around with papers on the desk, telephone and appointment books, or somewhere else in the area where he might think that someone would conceal a set of spare keys or a combination number. He also knows that locked desk drawers will generally respond to the same rules as above, and will go fishing for the extra key. In some cases if the intruder doesn't have a camera with him, or determines that it would be best not to transport the files or data to another location to copy, he will use the facilities provided on the premises, ie the office xerox machine. This is plenty adequate for their purposes at the time, but in some cases a record is kept of the copies made on the machine, and the machine will generally have a copy counter on it. Even knowing this though, some will continue and use it anyway figuring that even if more copies were noticed on the machine, it would be figured that some employee made a mistake. If the file or data desired is not returned to its normal resting place in its exact order many times this wiU be a telltale sign. If the search is being conducted at night, some pros forget about the lighting. Many will carry a narrow beamed flashlight with them to conduct their search, and sometimes this will not be extremely workable. Lights will be turned on, but curtains will not be drawn, and spaces between entrance doors and the floor will not be covered and telltale light wili escape from what should be an otherwise dark office. On top of that many will forget to remove and or restore these security measures to their original position after they have completed their work. They will leave blinds drawn, doors closed or opened that shouldn't be etc. RULE: When conducting these operations a careful professional agent will leave everything he has touched in the same position he found it in. They do, however, occasionally slip, and this is their mistake. EXITING: Exiting from the target area is as dangerous as the entering or it and is generally given as much attention. Unfortunately, most bldgs. are concerned with the illegal entry to the premises and pay little attention to people exiting, thereby making the exit a less worrisome detail to the professional. Places with good security though will have a sign out system employed utilizing a guard and one exit point, and some will even have a package inspection. In conjunction some places will have it so that anyone leaving the premises has to be let out by the guard who opens an otherwise locked door, and they will have silent alarms hooked up to their other doors not used for exiting. Professionals are aware of this and will always make a dry run to check out the security system procedures used, will have themselves well covered with an appropriate story, and will notice any unforseen obstacles. They will then devise a method to circumvent these security procedures and then make another dry run to insure that the newly devised circumventing methods will work for them. They will then conduct their operation. SUMMARY: To summarize all the data included above into a fairly concise sequential outline of what would happen to an area if there were a covert data collection operation planned against us to gain some data from one of our organization or one of our files I will write up this summary of how things might happen. [page 12] First it is decided that data is desired from a particular area. Some basic investigation work goes into finding out where in the the general area the data is located. At the same time some basic background data is searched for to find out what the area is all about. Then generally the Case Officer wiii go down to take a quick general looking over of the physical premises to become familiar with the physical obstacles which might have to be gotten around. If it appears that there are many security procedures which the agent does not think he can get around the C/O will often go and conduct a more thorough case of the place himself, as he is generally more experienced. The case officer will then peruse his resources to see if he has someone who will meet the qualifications to fit into the target area, and he will design his plan of action so that the agent being used can uork or for some reason be directly in that area. If this is not possible due to the fact that the agents on hand do not meet any of the needed qualifications for the exact target area, or the fact that the area is not accepting any new people for any reason, then the C/O tries to see if he ' can get an agent into the overall general area. (IE in this last case an agent wuld be sent in on lines as a student or an expediter rather than having one placed in Treasury). In either or the above cases the agent once inside would try to locate the data needed from the target area while he is authorizedly inside the area either during normal hours or after normal hours when no one is around and he has already established a pattern of working late. If either of the above approaches cannot be accomplished by the C/O and agent then a call would be placed to the bldg. mngr to find out what the security precautions of the bldg. are. A careful case of the physical location would then ensue. An agent would then try to be placed anywhere else in the bldg. where the org is located. This would include any positions such as a guard, cleaner, maintenance man, or in another office nearby as a last resort. The guard cleaner maintenance person would in most cases be able to by-pass whatever security precautions are extant, and the person inside another office would at least be able to stay late and give data about what procedures are used, and allow another into the bldg. after normal hours. In any of the cases last mentioned the agent must have *will have a good cover to explain why he is in the target area. This cover will seem logical to most people concerned, and will be thought little of. Each of the above will also have an alternative cover to logically explain why they were caught with their fingers in the till. This is done to show that it is an individual action and not one that is directed by either another or a group. Depending on the type of area, and the data needed, as well as the security measures used to defend the area the next approach would either be used before or after the last one mentioned. This approach is that of utilizing another comm line into the area. It is the other firm, or person who has normal dealings with the target area who would request some of the data needed. This would also include the approach of the person who calls and says he is from one firm and is sending another down to pick up the data. The last approach used mainly due to its inherent dangers is that of illegal entry, This would be where the agent would know what the security precautions of the bldg. are, what procedures are used by the guards, what kind of Iocks are used, and [page 13] would by-pass the guard bv sneaking around him, by walking past him as if he belonged there or by staying in the building in a safe and undetectable place until after the closing hours, and until he was sure no one was left in the target area, and he would then get into the target area, by using a credit card, a lock pick, a key previously made from a wax or key impression or be let in by a friendly guard or cleaner after he has stated that he has left his keys inside the office. This is the approach that was a last resort approach, and whereby the agent would get in and out in as short a time as possible and have a method whereby he could copy the data in as short a time as possible and return it to its exact place in its exact orders quickly as possible. After one has read the data in the above Hatting letter, one should go back and study all of the data in here as closely as possible. Each approach should be thoroughly understood in the above write up, and the details of each. Many of these approaches or safeguards, or methods and techniques will be used in combination with some of the other approaches, and the only way to start to recognize some of the signs that you or your area is being infiltrated is to have a thorough knowledge and understanding of the principles of each approach. Also, remember that one of the most effective methods used by these professionals is to get a number of these approaches started at one time in an area. This serves 2 functions. It helps to confuse someone only looking for one person trying to infiltrate the area, and it gives the C/O a number of alternatives to work on so that he does not have to put all his eggs in one basket. So, keep your eyes open and get busy. LOVE DON |
![]() |
![]() |
![]() |
![]() |
![]() |
|
![]() |
|||
![]() |
![]() |
![]() |
![]() |
![]() |