Good morning, AnonInts. Today we talk about developing and reliable methods of communicating with your very own intelligence gathering cell network. While dataveillance should be the bricks of any modern counter-intelligence op (and can be done from anywhere in the world, whether really, or by using 7 proxies), HUMINT is still the mortar that must hold it all together. 'Knowing' things from your adversaries' electronic transmissions does you no good if some of your intel cannot be vetted in the 'real world.' At least, what you intend to use as minor leverage. That said, here is how to create and link some cells.
Cell Structure: Begin your op with uncrackable confidants. If your cover is blown, CGCI will do everything they can to 'poop in your roost,' so to speak.. Loyalty is a must. Once your core cell grows to about four or five, split it, and allow your new 'cell leaders' to form their own cells of four or five. This turns your network into a 'circle' of 'cells.' Various circles can be assigned different matters to gather intelligence on. This increases the focus and effectiveness of results produced. On down the line.. When the network grows large enough, circle leaders will have to be assigned, generally drawing from core cell members and key sympathetic moles in your adversary's ops.
Cell Communications: Despite the section title, you never want to communicate with another operator in plain language over a telephone. It's not just risky, it's operational suicide. Become a master a elliptical conversation, that is to say 'The Art of Story Telling,' or saying something that really means something completely different than the words you use. It is good to have code words agreed upon. Also, if you know your fellow operators well enough (which you should) you can allude to past events which may conjure up a hidden meaning. Ciphers, such as the OTP method taught earlier, are critical. Unfortunately this means keys must be passed, which means a risk of breaking OpSec. Fortunately, the last thing your local piggies will be suspecting is a redux of professional tactics. This shit is waaay over their heads, and will not even be anticipated.
The Brush Pass: This is at once the easiest, most certain, and most dangerous way to pass critical intel, such as keys, ciphers, photographs, or maps. It is easy and certain because you can physically ensure the correct party receives the intel. It is the most dangerous, because if you get caught, the gig is up, and whatever you are carrying has now been intercepted, along with your person.
It's Simple: You and another operator arrange a time and place for a meet by various means, usually involving code words and elliptical conversation. Operator 1 shows up a few minutes early to verify that the meeting place is secure, They busy themselves with something innocuous, passively scoping, in case of the random pig or nosy onlooker, and waits. Operator 2 shows up on a route that intersects with Operator 1, and at the point of contact documents are seamlessly exchanged, and both parties exit the AO (Area of Operations) as soon as possible. NEVER TALK AND EXCHANGE AT THE SAME MEETING. The idea is 'two strangers pass in silence.'
The Dead Drop: This is one of the more secure methods to pass HUMINT in the real world. It's relatively safe for each individual operator, as they will not be required to break OpSec to utilize it. Its only risk is that unless the drop is picked up in a timely manner, it is vulnerable to interception if your drop site has been discovered. There is a long standing variant that accounts for and mitigates this, which will be explained as well.
It's Simple: Drop sites, and marking sites must be prearranged using codewords or elliptical conversation at the beginning of the Op, when you are most secure. If you feel a site has been compromised, change it. Ideally, your drop site, and your marking site should have some geographical space between them. How much is up to you, but your aim is not to have your comms intercepted. Remember that always. Operator 1 lays/makes their marker at a marking spot to signal to Operator 2 that the DD is going to be filled. Operator 1 proceeds to DD with materials, fills, leaves the AO. Operator 2 observes the mark, removes it, and proceeds to the DD to retrieve the materials. Operator 1 can observe that the mark has been removed, and thus assume the DD has been retrieved.
REDUX: For extra sensitive comms (or if one believes a DD might be compromised, but has not been able to set a new one,) it may be necessary for Operator 1 to loop back, and remove the DD after a small amount of time has passed. Ideally you should allow enough time for Operator 2 to remove the prearranged comm, and exit. If they fail to do this for whatever reason, letting the comms remain is unacceptable, so take them back, and await a better moment. A good operator has excellent timing abilities.
Protips:
It's a good idea to make comms so that they cannot feasibly be traced to you directly if intercepted. Leave no fingerprints, leave no DNA, writing samples etc. Wear gloves when handling. Use a laser printer. Prudence is an operator's best friend.
Cigarette packs, due to the propensity and general overlookedness of litter in our modern society make excellent DDs. They are even moderately waterproof.
Cased Dog Whistles, when the piston on the whistle is fully screwed down, a compartment is available for the placing of small comms. Dog whistles are uniform, and while they are somewhat eccentric, are overlooked by many. Aside from use as signalling devices (which is not hampered by their use as envelopes), they can be swapped at a DD location or in person with noone the wiser, as long as the exchange is not witnessed. They can even be kept in plain view on your person. They are cheap and entirely waterproof, which is a plus. I invented and used this technique for months, and CGCI is shitting their pants as they read this line, since they remember seeing the whistle and thinking it was a simple joke or affectation. O Hai, Gentlemen. ;D
Tree Hollows, an oldie but goodie. Pretty self explanatory. See also, underneath park 55 gal drum trash cans. You'll see these beasties chained to the ground, nobody's touching them but you and yours.
In general, use your imagination, and stick to your OpSec. @LLCStr1ng3r
No comments:
Post a Comment