While this technique obviously takes better manual dexterity and is more prone to error, it has the countersurveillance advantage that the operatives are not carrying anything after the transfer, and can blend into a crowd even more easily. Let us suppose that one agent recruits two others. When long-range or long-duration patrols need resupply, a variety of techniques are used, all involving tradeoffs of security, resupply platform range and stealth, and the type and amount of resupply needed. Vilyam Genrikhovich Fisher, usually better known by his alias, Rudolf Abel, was a Soviet intelligence officer who came to the US under the false identity of a US citizen, Emil Robert Goldfus, who had died in infancy but was used by the USSR to create an elaborate legend for Fisher. When targets were discovered, Air Force Combat Control Teams with the ground forces would communicate over secure radios to AWACS. On their mission, they then confirm, amplify, correct, or refute this information. Clandestine HUMINT sources may also act as local guides for special reconnaissance. He never failed, moreover, to remain alert for operational leads--potential agents, counterintelligence indicators, propaganda possibilities. The very knowledge that a dead drop exists can cause it to be trapped or put under surveillance, and the member of a brush pass that carries it will be hard-pressed to explain it. Other missions may deal with locating targets and planning, guiding, and evaluating attacks against them. They may be operating in counterterror roles in Iraq in the joint UK/US Task Force Black. It should be possible to approach the container to fill or empty it, and not be easily observed from a street or window. An agent of influence, being witting or unwitting of the goals of a foreign power B, can influence the policy of Country A to be consistent with the goals of Country B. If there is a requirement to collect intelligence, skills anywhere from advanced photography to remote sensor operation may be required. There is a SIGINT platoon within the Intelligence Company of the new Marine Special Operations Support Group. Special reconnaissance Last updated March 04, 2020 Navy SEALs conducting special reconnaissance in Afghanistan, 2002. Actual recruiting involves a direct approach by a case officer who has some existing access to the potential recruit, an indirect approach through an access agent or proprietary, or has reason to risk a "cold" approach. (JP 3-05) See ADP 3-05, ADRP 3-05, ADRP 3-90, and FM 3-90-2. The Soviet government will register a protest and will for a short time refuse to exchange its diplomats for the diplomats of the aggressive country. While DA and UW can be conducted by national military or paramilitary organizations, al-Qaeda and similar non-state militant groups appear to use considerably different clandestine cell system structure, for command, control and operations, from those used by national forces. Reconnaissance and surveillance actions normally conducted in a clandestine or covert manner to collect or verify information of strategic or operational significance, employing military capabilities not normally found in conventional forces are called these actions acquire information concerning the capabilities, intentions and activities of an enemy. their specially equipped four-wheel-drive vehicles from bases in SR troops, however, also are trained in much more advanced reporting, such as preparing multiple map overlays of targets, lines of communications, civilian and friendly concentrations, etc. Actions conducted as a special operation in hostile, denied, or politically sensitive environments to collect or verify information of strategic or operational significance, employing military capabilities not normally found in conventional forces are called _____. A Soviet officer commented, whatever an agent's role in the intelligence net, personal contact should be made with him only when it is impossible to manage without it. That Fisher/Abel only had one assistant, with operational responsibilities, is not surprising. The last might seem surprising but this was under a GRU assumption that military attaches would always be assumed to be intelligence officers, but that members of the civilian part of an embassy might actually be diplomats rather than intelligence officers.[2]. An agent or courier can put a magnetized box inside a bumper on a parked car. Without modern military electronics, and occasionally civilian ones, modern SR is fundamentally different from special soldiers that took on such risky missions but with unreliable communications and a constant danger of being located through them. Conversely, if Sherrill has no such evidence, she could (and should) face a resolution of censure or resolution. Such a ruse is a violation of treaty obligations. Unless a clandestine station has a strong cover identity, the larger the station, the larger the possibility it may be detected by counterintelligence organizations. Even with the most sensitive agents, occasional personal meetings are important in maintaining psychological control. Typical cover for an agent absence would be taking a vacation or holiday. The SR may be able help with observation, photography, and other measurements. A Soviet double agent is a Soviet with access to classified information. Once the information is captured, it must be transmitted. LRS teams normally operate up to seven days without resupply depending on terrain and weather. Target analysis could go in either place. This term usually is reserved for the first or most sensitive recruitments, although specialized support personnel, such as radio operatives acting alone, are called singletons. [16] Still, when the message is very short, the key is random or nearly random, some methods, like the Nihilist Straddling checkerboard may offer some resistance. Each man carried equipment needed for up to 25 days due to resupply limitations (cf. Proprietaries, which can be large businesses (e.g., the CIA proprietary airlines such as Air America, which, in the interest of cover, often had the latest aircraft and flew commercial as well as secret cargo), often are not controlled from the local area, but by headquarters. In CIA terms, this might be a head of a country desk or a regional desk. Long Range Surveillance teams operate behind enemy lines, deep within enemy territory, forward of battalion reconnaissance teams and cavalry scouts in their assigned area of interest. The new illegals never mix and never enter into contact with the old ones who have been working in the country for a long time. Frequently, at least one individual is known to the host country, so there can be a deniable channel of communications. Sometimes technical specialists without SR training have taken their first parachute jump on TECHINT-oriented missions. Typically, criminal prosecution will be the primary goal against drug and slavery groups, with breaking up their operations the secondary goal. Then it will capitulate, the exchange will take place and the newly fledged illegals will remain behind in safe houses and flats. In the latter case, the agent may be called a lead agent or a principal agent. event of hostile overrun or other circumstances under which normal access would be denied.[6]. ... A conference held among the team members, police intelligence unit before a surveillance in conducted. ... Special reconnaissance is reconnaissance and surveillance actions conducted as a special operation in hostile, ... guidance, the scout understands how to conduct actions on the reconnaissance objective. Software defined radio, along with standard information exchange protocols such as JTIDS Link 16, are enabling appropriate communications and situation awareness, reducing the chance of fratricide, across multiple military services. [11] Their primary equipment is the AN/PRD-13 SOF SIGINT Manpack System (SSMS), with capabilities including direction-finding capability from 2 MHz to 2 GHz, and monitoring from 1 to 1400 MHz. The latter is a serious operational move. Units on short missions may carry all their own supplies, but, on longer missions, will need resupply. The SR role frequently includes covert direction of air and missile attacks, in areas deep behind enemy lines, placement of remotely monitored sensors, and preparations for other special forces. The original sensors, a dim ancestor of today's technologies, started with air-delivered sensors under Operation Igloo White, such as air-delivered Acoubuoy and Spikebuoy acoustic sensors. Larger UAVs, which could be under the operational control of the SR team, could use additional sensors including portable acoustic and electro-optical systems. An F-13 conducted the first flight by an Allied aircraft over Tokyo since the Doolittle Raid of April 1942. While the FACs immediately helped, air-ground cooperation improved significantly with the use of remote geophysical MASINT sensors, although MASINT had not yet been coined as a term.[17]. For example, the Soviet GRU covered some intelligence officers under the TASS news agency, or as part of a trade or technical mission, or even as diplomats. Typically, a clandestine collector will put espionage material, perhaps in encrypted form, into the box, and use some prearranged signal (ie. reconnaissance, surveillance, and target acquisition (RSTA) annex. Should it happen that operating conditions become difficult, or that the embassy is blockaded or closed down, the group will be able to continue its activities in the same way as before.[5]. What are the finances? Collection Management Officer (aka Reports Officer, Intelligence Officer): does preliminary report categorization and organization. Their mission is not to engage in direct combat. Operation Trudy Jackson, the capture of an island in the mouth of the harbor before the Battle of Inchon by a joint CIA/military team led by Navy LT Eugene Clark, landed at Yonghung-do is much more in the SR/DA realm. This page was last edited on 10 January 2021, at 12:02. Lightweight unmanned aerial vehicles with imagery and other intelligence collection capability are potentially useful for SR, since small UAVs have low observability. And though he groaned over the chore of putting it on paper, his reporting became thorough-and more than thorough, illuminating-for he rarely failed to make interpretive comments. All these organizations have special operations roles, with SR often by specialists within them. They may stay behind, where the unit deliberately stays hidden in an area that is expected to be overrun by advancing enemy forces. What’s in the hangars and warehouses? These patrols surveyed major centers of enemy activity. There is much more argument for doing so at headquarters, possibly not as one unit but with regular consultation. [9]. At one time, invisible ink, a subset of steganography, was popular in espionage communications, because it was not visible to the naked eye without development by heat or chemicals. This process of increasing the numbers and the gradual self-generation of independent organisations continues endlessly." Counterintelligence could wait until the car is out of sight following a toss, then apprehend and interrogate the courier, or simply keep the courier under surveillance to discover another link in the message route. Other agents recruited by residencies are gradually organised into agent groups of three to five men each. These priorities, however, are apt to reverse in dealing with terrorist groups. This technique presents opportunities both for plausible deniability and for penetration by hostile agents. This page deals primarily with one's assets. Before the agent actually starts to carry out assignment, training in tradecraft may be necessary. Skills here can include the operation of cameras appropriate for espionage, methods of carrying out documents without detection, secret writing. If the attack was to be guided from the ground, the target would be directly illuminated with some equivalent way of putting a virtual "hit me here" indication on the target, such as a laser designator. A related British operation in World War I was run by a controversial military officer, Richard Meinertzhagen, who prepared a knapsack containing false military plans, which the Ottoman allies of the Germans were allowed to capture. May be the administrative chief. This plainly makes life more secure for both parties. Force Reconnaissance (FORECON) is one of the United States Marine Corps' special operations capable forces (SOC), and supplies essential elements of military intelligence to the command element of the Marine Air-Ground Task Force (MAGTF), by supporting their task force commanders, and their subordinate operating units of the Fleet Marine Force (FMF). Like other special forces, SR units may also carry out direct action and unconventional warfare, including guerrilla operations. Offensive counterintelligence specialists may use them against foreign intelligence services (FIS). These later merged in 1940 with the propaganda unit Department EH to form the basis of the Special Operations Executive (SOE), which would conduct irregular warfare operations in occupied Europe. the 7-day limits of conventional LRS patrols discussed above). The illegal residencies were preferred to be in safe locations, perhaps of allies such as the United States, Great Britain and Canada. In World War II, Spanish security services, while officially neutral, often passed information to the Germans, which, in this case, is exactly what the British wanted done. By various channels the group sends it material directly to Moscow. Improvised methods are most useful when they only have to protect the information for a very short time, such as changing the location or time of an agent meeting scheduled in the same day. For example, during the Falklands War of 1982, UK Special Air Service delivered using helicopters eight 4-man patrols deep into enemy-held territory up to 20 miles (32 km) from their hide sites several weeks before the main conventional force landings. A Soviet, and presumably Russian, term of art, maskirovka or 'denial and deception', is much broader than the current Western doctrine of deception being run by lower-level staff groups. [quotation?] Basic photography[9]:C-9 - C-14 and sketching is usually a skill for everyone performing SR missions. They can infiltrate and exfiltrate selected personnel by submarine, surface vessel, aircraft or land vehicle. Clandestine HUMINT sources may also act as local guides for special reconnaissance (SR). GPS tells the patrol its location, but laser rangefinders and other equipment can tell them the exact location of a target to send to a fire support unit. SR units carry out these missions when no other capabilities, such as conventional ground forces, local scouts and aviation, UAVs and other systems under the control of higher headquarters, and national-level intelligence collection capabilities cannot obtain the needed information. For example, in World War II, it was occasionally necessary to send supplies to Allied POWs, but Red Cross parcels were never ever used for this purpose. Because even the most secure radios can be detected and located—albeit by technical advanced airborne or spaceborne receivers—it is good practice to make transmissions as short and precise as possible. This page deals with Clandestine HUMINT operational techniques, also called "tradecraft". U.S. Air Ground Operations Against the Ho Chi Minh Trail, 1966-1972", "Apollo's Warriors: US Air Force Special Operations during the Cold War", "AN/GSQ-187 Improved Remote Battlefield Sensor System (I-REMBASS)", "Operation Biting, Bruneval, 27th/28th Feb. 1942", "Joint Publication 3-05.5: Special Operations Targeting and Mission Planning Procedures", "Scud Hunting: Counter-force Operations against Theatre Ballistic Missiles", "Joint Combat ID through Situation Awareness", "Commandos from Beyond the Silence of the Sea", "Special Service Group (Navy) - Pakistan - Documentary", Long Range Surveillance: True test for ‘quiet professional’, Eyes Behind the Lines: US Army Long-Range Reconnaissance and Surveillance Units, US Army Field Manual 7-93 Long Range Surveillance Unit Operations. There are a number of techniques that do not require the helicopter to land, in which the SR team clips harnesses to ropes or rope ladders, and the helicopter flies away to an area where it is safe for them to come aboard. The ability to elude professional counterintelligence personnel following the agent, for example, may confirm the counterintelligence organization's suspicion that they are dealing with a real agent. The doctrine of bringing increasingly more accurate and potent firepower has however been evolving significantly since the early days of Vietnam. Indeed, most criminal and militant surveillance is conducted by one person, or … Professional intelligence officers, such as Robert Hanssen, may insist on being singletons, and go even farther, as with Hanssen, refuse in-person meetings. In reality, clandestine communications personnel may be aware of the direct contact, but newer electronics allow the leader to manage his or her only communications. Active measures, however, reflected a national effort to influence other countries to act in concert with Soviet goals. [citation needed] The US has been emphatic in prohibiting any relationship between intelligence and the Peace Corps[citation needed]. In this more dangerous method, the transfer is from hand to hand, or from hand into a pocket. SOT-As also have the abilities to exploit computer networks, and sophisticated communications systems. They may need to have wounded personnel replaced, and sometimes evacuated. An intermediate approach has the touchscreenofficers clearly working for their country but without diplomatic immunity and with a cover role that does not immediately suggest intelligence affiliation. Every SR mission will collect intelligence, even incidentally. The term is not strictly limited to houses, although many intelligence services use rural houses for extended functions such as debriefing defectors. It may involve carriers. Agents, to varying extents, need reinforcement. MASINT sensors exist for most of these requirements. A doctor, medic, or any other type of medical personnel. In late 2010, according to the official, US-trained Somali agents conducted an operation in a Shabab area that failed terribly and resulted in several of them being killed. Cox had significant knowledge of British radar, and conflicting reports say that the force was under orders to kill him rather than let him be captured. If there is a need for personal meetings, the agent must know how to request them, and also to alert the network leader or case officer that the agent may be under suspicion. Initially, he was based in Pforzheim, (West) Germany.[4]. Other countries might have the functions under the same organization, but run them in completely different networks. In the Kennedy Administration, National Security Action Memorandum 57 spoke to paramilitary operations, which can be clandestine only until there are survivors, or at least evidence, from combat operations following a study by an interagency committee, "the Department of Defense will normally receive responsibility for overt paramilitary operations. This section deals with the recruiting of human resources who do not work for a foreign intelligence service (FIS). Patrols operate semi-independently and return … For details, see Clandestine HUMINT asset recruiting. While computer-based steganographic techniques still are viable, modern counterintelligence laboratories have chemical and photographic techniques that detect the disturbance of paper fibers by the act of writing, so the invisible ink will not resist systematic forensic analysis. Sometimes, there is a broader policy need not to have the possibility of drawing suspicion onto an NGO. However, the US Army's 5th Special Forces Group held an advanced course in the art of patrolling for potential Army and Marine team leaders at their Recondo School in Nha Trang, Vietnam, for the purpose of locating enemy guerrilla and main force North Vietnamese Army units, as well as artillery spotting, intelligence gathering, forward air control, and bomb damage assessment. Well-managed agent relationships can run for years and even decades; there are cases where family members, children at the time their parents were recruited, became full members of the network. The processing and exploitation phase increases the utility of the collected data by Capture of enemy equipment for TECHINT analysis is a basic SR mission. Key operational agents of influence are apt to be run as singletons, although political considerations may require communication through cutouts. At the time -- and for centuries afterward ... involves observing the subject's actions as he travels around outside the home or office. Saudi Arabia to Iraq. Military Assistance Command, Vietnam – Studies and Observations Group (MACV-SOG) was a highly classified, multi-service United States special operations unit which conducted covert unconventional warfare operations prior to and during the Vietnam War.. [5], Conventional military forces, at battalion level, will often have scout platoons that can perform limited reconnaissance beyond the main line of troops. They were Communist agents, and the Soviets certainly did not treat them as useful idiots. Such a technique needs both a laboratory and considerable technical skill, and is prone to damage and to accidentally falling off the paper. In some cases, if a car can drive slowly down a street or driveway not easily observed, a courier can toss a message container into an open window, making the transfer method intermediate between a brush pass and a dead drop.