"ДОСЬЕ КРЫЖАНОВСКОГО" : АГЕНТ КГБ ДОНАЛЬД ТРАМП (англ). 11. Михаил Крыжановский. Читать онлайн

The current government assumes extraordinary powers not allowed by the legislation. It often happens when the president is democratically elected, but later takes control of the legislative and judicial powers.
 Actual espionage is not what you see in the movies and you have absolutely no chance of evasion if a real professional surveillance crew is following you. Why? Because they use multiple methods and mixed methods.. Physical surveillance.
"One line" – officers follow the object forming a line behind him and passing him one by one.
"Two lines" – officers form two lines on both sides of the street.
"Circle" – officers block the area and start searching (used in case they lose the object).
"Fork" – one officer (a car) moves in front of the object, another one – behind, other officers (cars) move along parallel streets
"Box" – used when the object enters supermarket, hotel, restaurant. One or two officers follow the object, the others wait for him at the exits.
"Demonstration" – officers demonstrate their presence to press the object and lower his activity.
"Provocation" – officers attack the object, beat him, steal (secret) documents. Often used to lower his activity if he’s trying to play James Bond.
"Outstrip" – officers do not follow the object because they know exactly where he’s going.
"Football" – officers pass the object to each other (car — a group — bicyclist — car…)
"Movie" – the crew watches the object in stages: first day — to the subway only, second day — from subway to his office, etc. (used abroad). The crew has to have a female member if they are watching a woman (she could use the ladies room for a secret meeting) and members of various ethnicities (white, black, Latino) because the object could go to a specific ethnic area.
If you’re the object and you’ve noticed surveillance:
Don’t rush, move at the same speed.
Relax at the nearest bar (and relax the crew).
Don’t show how professional you are by trying to disappear, otherwise they could intensify surveillance or even neutralize you (smash your car, beat you up).
Postpone the operation you were engaged in.
Use a "draught" if you need to see your agent no matter what. Change lanes (if you are driving), stop the car and then drive left or right.
If you don’t see surveillance, that means either there’s no surveillance or you’ve failed in counter-surveillance. Discreetly watch the agent who’s coming to meet you and try to detect any possible surveillance; or you may have been "outstripped. "
Surveillance crew mistakes:
The same crew follows the object all day long.
The object "rules" the crew and calculates it (he moves faster — the crew moves faster).
A crew member is too noticeable (unusual dress, haircut, disabled parts of the body, too fat or too skinny, too ugly or too pretty).
The crew starts to search possible hiding places for espionage evidence right after the object leaves (and he may be watching).
The crew leaves traces after a secret search of the object’s house (office).
The crew does not report its mistakes or the fact that they’ve lost the object.
The crew is not professional (using childish tricks like jumping out of a subway train just before the doors close).
Technical Surveillance
1. Visual surveillance. Done through special holes in the ceilings and walls, through the windows from the opposite building (car) or by installing the camera inside the house (you can substitute something, like a clock, for the same thing but "stuffed" with a camera or recorder. ) You can use informant as well to watch the object outside his house (especially if you want to do a secret search).
2. Listening devices. The easiest thing is to listen to the object’s phone (record all calls, including those dialed "by mistake"). If you work inside his apartment, make sure you equip the room where he usually talks. Attention: avoid widespread mistake when your agent keeps the listening device on his body; install a miniature device in his clothes or shoes, because the object could try a test and ask the agent to take off his clothes or invite him to the sauna or pool.
3. If you are working abroad, listen 24/7 to local counterintelligence surveillance radiofrequencies.
4. Reading the mail. When you control the object’s mail, remember he could use multiple addresses and PO boxes. Open all the letters with no return address or PO box. Watch when you open the letter — the object could leave a tiny piece of paper, hair, etc. to check if anybody opened the letter. Analyze the text carefully — there could be a cipher or the words with double meaning (jargon), especially when you read mafia mail.
5. Combination of above-mentioned methods
Spies Identification
If a spy is an intelligence officer working abroad under "cover" (diplomat, businessman, reporter) you can identify him by:
– following the careers of all diplomats who work at your enemy’s embassies all over the world
– recruiting a "mole" inside the intelligence service (or inside the station)
– setting up your agent for recruitment by the enemy’s station
– watching foreigners who try to make discreet contacts with native citizens with access to secrets
– making a model of a spy (professional behavior, attempts to detect surveillance, attempts to recruit sources or just get any classified information during normal meetings, "throwing away" money trying to get access to government employees, military and scientific circles)
– using secret surveillance and listening devices inside the station and practicing secret searches
If a spy is an intelligence officer working in your country under "cover" of a native citizen (or he is recruited by a native citizen) you identify him by making a model (contacts with identified spies — that’s often the only sign which points out a spy, and that’s why surveillance is very important in getting information from a "mole"). CIA “mole” and KGB intelligence officer V. Martynov arrested at Moscow airport, 1987.
CIA “mole” and KGB intelligence officer V. Martynov arrested at Moscow airport, 1987. Later he was executed.
A "mole" is a spy inside the government, recruited or "installed" most often within the special services, by an outside government/agency. The 3 most dangerous things a "mole" can do:
1. Calculate President’s plans and decisions judging by information he’s asking for.
2. Manipulate information being sent to President, and thus influence global political decisions
3. Paralyze to some extent the government (if he’s CIA or FBI Director)
Methods to detect a "mole":
A. Use index cards (special file) — never use computers to save this information!
Prepare a file on each officer and mark there the signs of a "mole" — has or spends too much money, asks too many extra questions; uses professional skills to check for physical and technical surveillance; has discreet contacts with foreigners; discreet copying of top secret documents; attempts to get a job in most secret departments; talks with close friends and family members about the possibility of making money as a "mole"; behavior deviations — extra suspiciousness, excitement, depression, drugs or alcohol addiction. Three signs are enough to start an investigation — the "triangulation" principle.
B. Use provocation. If a prospective "mole" is looking for a contact with the enemy and is ready to betray, and you have exact information, organize such a "meeting" for him. Do not arrest the person right away — play along, as he may give you connections to other people who are ready to betray. There’s one more provocation method: you supply the suspects with "highly classified information" and just watch what they do.
C. Use "filter" or "narrowing the circle. " Include all the officers you suspect in a "circle" and narrow it until one name is left as the most likely suspect.
D. Make a "model" of a "mole, " judging by information you have on him.
E. Recruit an insider. Recruit a "mole" inside your enemy’s intelligence service and he’ll help you to find the one inside yours (it’s called "grabbing the other end of a thread").
F. Don’t trust anybody.
What to do if you’ve detected a "mole"
– assess the damage
– restrict his access to classified information and start "feeding" him with fake data
– stop all operations he was involved in and create the illusion they are still in progress
– bring home officers and agents who work abroad and had contacts with him and those to whose files he had access
– start 24/7 surveillance if you’ve decided to play the game and look into his contacts
– arrest the "mole" discreetly (if you want to continue the game)
Effective methods to prevent treason do not exist.
How to cover your "mole"
There are special methods to cover your own "mole" and a "switch" is the most effective — it’s when you "switch" counterintelligence to other, innocent persons who work with the "mole. " You can try information "leaks" through a "double agent" — it looks like you receive top secret information through another traitor or by breaking the electronic security systems. Or you can try information "leak" through publications in big newspapers — it looks like information is not secret and is known to many people or there’s another "mole. "
Special Strategies
Every operation demands a set of original methods, especially if we are talking about strategic intelligence. I give you a few examples.
1. "Domino" or "chain reaction. " A coup, revolution or civil war in one country provokes the same actions in other countries (neighbors). It doesn′t matter what country is going to be next, most important – what country is a target.
2. "False flag". The planned, but never executed, 1962 Operation Northwoods plot by the U. S. administration for a war with Cuba involved scenarios such as hijacking a passenger plane and blaming it on Cuba.
3. "Sliding" strategy. Transformation of a secret operation into an open one: support of illegal opposition/coup.
4. "Restriction. " You damage (limit) international and economic connections (projects) of the enemy.
5. "Monopoly. " Special operation to keep country’s monopoly or status as economic leader or special (nuclear) holder, or high tech producer. Includes actions to restrict the attempts of other countries to get strategic raw materials and modern weapons and technologies.
6. "Reverse effect. " The government declares a certain goal and launches a military or special operation, but the result is something quite different, possibly opposite. Examples: instead of separating (ethnic) group "A" from group "B" both of them are being exterminated; instead of peace and democracy in a certain region, power is being concentrated in one group and the opposition is being exterminated.
7. "Clash. " You "clash" the government and opposition of a target country and support civil war until the country is ruined and you get it for free.
8. "Salami-slice strategy". It’s a process of threats and alliances used to overcome opposition. It includes the creation of several factions within the opposing political party, and then dismantling that party from inside, without causing the "sliced" sides to protest.
9. "Positive shock. " A domestic operation; to save the government during a crisis, special service provokes artificial civil conflict or sabotage, imitation (terror), and the government takes care of the "problem. "
10. "Controlled crisis export" (see "Foreign Policy")
11. "Sanitation border. " "Fencing" the target country by enemies (neighbors).
12. "Alibi. " You build a "chain" of evidence (witnesses) and move the investigation to a dead end.
13. "Passive sabotage. " A very effective strategy used to cover up a major action like the assassination of a President or the destruction of several office towers. You just "do not see the bad guys" who are going to kill the President or blow up the city. In any case you win — the perpetrators are not sure you are watching them; you can arrest them if the object survives or liquidate them once the object is dead. You don’t need a big conspiracy, you just give the order to ignore certain people until their plan materializes.
14. "Special tour. " You help the target country to "build democratic institutions" (the government and local administrations) by sending official crews to help. Actually, they rule the country and that’s a "hidden occupation. "
15. "Mask. " You mask your actual global plans (reforms) by another big action (war).
16. Illegal espionage operations. Very dangerous, because illegal spy is playing born American and can make career in business, becoming #1 Pentagon supplier or in the government, getting to the Congress or even White House.
Chapter 6. Counterespionage management
"Golden rules"
1. Don’t die a hero – that’s bad planning, poor training and lack of experience; the dead man goes to a hall of shame and stupidity. Bad planning is an operational failure; once things have gone off track it is far more complicated to achieve the objective. Multi-step complex operations come from the fantasies of bureaucrats who watch too many movies. Keep it simple if you want to get it right.
2. Never provoke people to break the law – that’s not professional.
3. Always look for insider if it’s about sophisticated operation (bank robbery, etc. ).
– secure and examine carefully the crime scene (every person who enters the scene is a potential destroyer of physical evidence)
– record the scene (make photos, sketches, notes with detailed wriwritten description of the scene with the location of evidences recovered)
– collect physical evidences (blood, semen, saliva, hair, documents, drugs, weapons and explosives, poisonous substances, fingerprints, traces, soils and minerals, fiber) and package everything
– collect confessions and eyewitnesses accounts and then
– make a plan of investigation and correct it later
– research similar crimes and criminals involved
– make a model (profile) of the suspect
– analyze expertise data
– work with secret sources
– cooperate with other divisions (abroad, if needed)
– make arrest
– interrogate
In daytime arrest people discreetly – don’t inflame extra public irritation. There’s a general rule: more arrests – less crime prevention (after being in jail people, engage in more sophisticated and secret criminal activity). After mass arrests at certain places (buildings) repeat the action in a day or two.
– chasing the object, block the area into circles (follow the plan for a certain area) and try to "push" him to a certain place where your team is waiting
– taking the object in the street: look around for his partner(s), who could shoot you from behind
– be on the alert if anybody tries to talk to you in the street – it could be an attempt to divert your attention
– arresting a crew, shoot and disarm any people with guns first
– never hesitate to shoot terrorists – some of them have mental problems and won’t think a second before shooting you
– arrest a dangerous object while he’s relaxed (drugs, alcohol, sex, sleep) and don’t let him kill himself, eliminate evidences or warn his partners. (Most people feel more relaxed when traveling abroad. ) To take the object alive, scream, shoot over his head, use smoke and light grenades.
– camouflage your team (as ambulance workers, construction workers, vendors, etc. )
– if there’s a crowd around the object, shoot in the air and order everybody to lie down— the object has no choice
– if the object is well armed and very dangerous (and you have intelligence information on that), you have to shoot him even in a very crowded area as you never know what he’s going to do next — take hostages, shoot people or blow up a bomb (three wounded people is a better score than three hundred dead).
Interrogation is a conversational process of information gathering. The intent of interrogation is to control an individual so that he will either willingly supply the requested information or, if someone is an unwilling participant in the process, to make the person submit to the demands for information.
Remember, people tend to:
– talk when they are under stress and respond to kindness and understanding.
– show deference when confronted by superior authority, This is culturally dependent, but in most areas of the world people are used to responding to questions from a variety of government and quasi-government officials.
– operate within a framework of personal and culturally derived values. People tend to respond positively to individuals who display the same value system and negatively when their core values are challenged.
– respond to physical and, more importantly, emotional self-interest.
– fail to apply or remember lessons they may have been taught regarding security if confronted with a disorganized or strange situation
– be more willing to discuss a topic about which the interrogator demonstrates identical or related experience or knowledge
– appreciate flattery and exoneration from guilt
a) "good cop / bad cop"
b)"story under a story" (after intense interrogation the object tells a different story — which is not true, either)
c) "bombing" with questions
d) pressure by not interrogating
e) "silence makes your situation worse" trick
f) "admit one small episode and that’s it" trick
g) "I help you — you help me" trick
h) "shift" – try to shift the blame away from the suspect to some other person or set of circumstances that prompted the subject to commit the crime. That is, develop themes containing reasons that will justify or excuse the crime. Themes may be developed or changed to find one to which the accused is most responsive.
The end? Hillary says “no”
Аugust 22, 2017
Hillary Clinton info@onwardtogether. org
To Mike Kryzhanovsky
Onward Together!
First of all, thank you. To have your support in this next venture means so much to me. Onward Together is the true culmination of a great deal of thinking and listening over the last few months, and I′m excited to continue sharing our work with you.
I hope you′re all enjoying your summers, and that you get a chance to relax with the people you love. Thank you, again, for your continued support. I can′t do any of this work without you. This team is one I′ll always be proud to be a part of -- I hope you will, too.

Рейтинг работы: 0
Количество рецензий: 0
Количество сообщений: 0
Количество просмотров: 41
© 12.06.2018 Михаил Крыжановский
Свидетельство о публикации: izba-2018-2294841

Рубрика произведения: Разное -> Политика