Secret Agent Volume 1 [1]

Secret Agent Volume 1 - Bill Pryor - 1986 - Eden Press.

258 51 29MB

English Pages 247 Year 1986

Report DMCA / Copyright

DOWNLOAD PDF FILE

Recommend Papers

Secret Agent Volume 1 [1]

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

VOL.

I

by BILL PRYOR

.

SECREf, AGEIII'

SECRET

YOLIE{E

1 ffi A 2 TC[.I}E SE

IHE STlfGiJ

Efr' To

FT}TD

A@IT

frIT

SqNRCE E.,UrDtsM[ 9F'

IqI

AfiTTHLTG ITEED IO r..OU ABOUT I}TDI?IDUALS, BUSTNESSES, AflD IHETR

AtrTE=S

BT

BILL AUTHOR OT EDEN PRESS

'

PRTOR

''PERSONAL AND BUSIilESS PRTVACY''

PTIBLISIIED

BI

EDEN PRESS, INC. POST OFFICE BOX 8410 Fot NTATN vA[LEr, cu.iFonnia

t7t4l

TOIJ,-FREE ORDER [

LINE: [ 800 ] 33S=8484 0utside Calif orn:.a ]

c0PTRrcriT PU8IJSTED

gzTzl

ss6_2023

BI

(0

iiDBT

1986 ilr Brr.L PRr0R PRESS

SECREf, AGENI

EIXT'T PRIIITIIG COPTRIGI{T

-

JINIE 1986

1986 BILL

PRYOR

PUBL]SIIED BY EDEN PRESS FOIINTAIN VALLEY, CA.

A11 ri.ghE,s reserved. No part of Ehis book nay be reprinted, reoroduced., or stored in any forn by electronic, mechanlcal, recoiding, ptrouocopying, or by any oEher neans uithout rritten pernissi.on of Ehe author.

all suggestlons, criEicisros, and recou[endations for improvemeng of this work. Material submiEted will be appropriaEely credieed if incorporaEed into fuEure ediEions. coMlunlcations should be directed via the publ.isher.

The author inviEes

composed

on rBM PC uslng-woRDSTAR; canera-ready copy printed on BR0TTIER HR-15 using 1012 Prestige ASCII fonr; printed in the ilnited SEares of .{oerica

This work makes references to Eradenarks, servlce marks, regiscered trademarks, and other Product or service nanes owned and utLllzed by partlis other than the author

or publisher. Proper credit IBM

-P-C_

_is_

Eo those owners

{s

recognized and staEed.

a reglsEered trademark of International Business Machines; is a reglstered trademark of Micropro International

WORDSTAR

PIJBLISHED BY EDEN PRESS

ii .=-:-rrsr:*

;

SECRET AGEI{T

ffitHllS: YUIE{B 1 .......r...... ............... lij a. TABLE 0F CoNTEI|TS PTELISIIER'S INTRODUCTION 1: ............... xJ PREFACE I. DISCITAIHER . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . r TIBLE OF

o

If.

IITRODUCTI0N

o

........................

ONE PTIRPOSE

e... r................................ IN IttrND . . . . . . . . . . . r . . . . . . . . . . r . . . t . . . . . . . . . . . . . . . . . . . . . .

HARDT{ARE RECOMITIENDATIONS AND ENDORSB,IENTS

TNTRUSToN HAS BECoME ACCEPTABLE

........

.......,...!...o........... !.. o . o. . . o.... . o... o.

o.. . ....

HIXANCIAL FILES ; MEDICAL FILES ; COMPIITER-AIDED IHTRUSIONS . o . . . . . . . . . AN OCIOPUS BUREAUCRACY . . . . . . . . . . . . . . . . . . . . r . . . . t . . . . . . . . . . . . . . . . . . . . IHESE FACTORS ASSIST THE MODERN-DAY INVESTIGAMR . t . . . . . . . . . . . . . . . . . . THERE IS ALWAYS A SUBIT.E NEED AT HAND ............o.................. EOI{-TO-DISAPPEAR BOOKS COITPOUND INVESTIGATOR'S JOB . . . . . . . . ., . . . I'' t . A SEIIANTICS LESS0N ...................................o!....... r....... r r. TARGEIS; INVESTIGAT0RS; SOURCES; REC0RDS ...................o........ TECHNICAL METHODS ; PHYSICAL I"IETH0DS ; TELEPHONE HETEODS ; . . . . . . . . ., . . . PI"AI{TED INF0RMATI0N; THE HUNT .........,...................,......... A FETJ LEGITIMATE NEEDS FOR SENSITIVE INFORMATION ......OO'!O"ttt.ttO.....

r.......... t.... .................................... FAKE BANKRUPTCY; CRO0KED PARTNERS; MfSSING PROPERTT ... .. .... ...... .. DIV0RCE ACII0N; ET CETERA; TABLES TURNED .......,....... r... . . . . . ... . SCAIT{MING DEBTORS

III.

IV.

TEE LAW AND SURVEILLANCE . . . . . . . . . r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .' r, . STATUTES, STPREI'IE C0URT DECISI0NS, AND POLICY ......... r o o r.. ...,.... TTILE IIf: THE ULTIMATE SOURCE STAruTE ............. or.........o...... r... ELECTRONIC SURVEILLANCE MAKES TARGETS FAIR GAI'TE IEAUIT .. .. .. t, . . WHAT THE LAW SAYS AND HOW IT IS EVADED ......... -,. .. t.. !..... . . . . . t.. C0MMUNICATIONS ACT 0F L934 .............. .. .... .. ... o o... . ..... .. o o . . 0LMSTEAD ; NARDONE; KATZ . . . . . . . . . . . r . . . . . . . . . . . . . . o . . r ! . . . . . . . . . o . . . OMNIBUS; MILLER; RIGIIT T0 FINANCIAT PRMCY ACT .............r..o.... BEEPERS & PEN REGISTERS; FISA ......................r....ro......... TEE TEIEPH0NE PR0BLEM ..................................r...e............. GAPING LoOPHOLES; PRIVATE CARRIER; VoICE THAT ISNiT YoICE o.. .. . . . ... C0RDLESS PH0NE; AIII0MATIC BILTING ............... ... o..... !.. r. !..... ET.ECTRONIC t"lAIL A RICH HUNTING PRESERVE ........................!r..... PRTVACY IAWS ARE- oBVT0USLY CTRCIIwENTED ................... o.. .......... .. THE MAJ0R C0NCLUSI0N .........................................o......... o. IT AINIT ILLEGAL SO LONG'S YOU DONIT GET CAUGITT .....Ot....!t........ cooPEMTrvE TEIEPH0NE PARTTES .................., r......r... ! t. ! !. t.. lHE PRIVATE OPERATIVE IS STILL ON TIIE HOOK ..........T'O""""'t........

FILES CT,ASSES EXISTENCE INROADS II{TO OFFICIAL CATEGORIES USAGE INVoLVES RISK...................-.. PIELTC RECoRDS ....... CITI IIALL: LOCAL SOURCES CITY LEGAL FILES ....... I',HAT CASE RECoRDS WILr DTSCIOSE TRAFTIC COURT DATA RECORDS AND

THREE GENERAL SIJ'IIILTANEOUS

PTIBTJSHED

BI EDEN PRESS

...............

I

I

I

I I

2

I

:

a

i

4

4

4

5

5

C,

e

(,

(

7

7

7

t I

c

9 1C

1C

11 11 11

1l 1l

L2 L2 L2 11 13 13

13

LA

L4

15

iti

SECRST AGEI{IT

TIBLE OF CIIITEtrIS: YOIII|E

I

BUSINESS REGT LATION REC0RDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CONS${ER PROTECTION . o . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . o . . . .

...........................................o......... .............. o.. o................................... COUNTY RECORDER lS OFFICE . . . . . . . . . . . . . . . . . . . o . . . . . . . . . . . . o . . . . . . . . . . . TNDHIES ARE TIIE KEYS T0 rtIE VAULT .....................,........,.... REAL PR0PERTY RECORDS .. o......... o............................... . .. COmmY CLERKTS OFFICE r . r......... e ................................. VITAL STATISTICS . . . . . . . . . . . . . . . . . . . . . . o . . . . . . . . . . . . . . . . o . . . . . . . . . . . . SEARCHES ARENTT FoR tlpApER TRrpprNG', ................................ TS FIRE

DEPARIIT{ENT

CO0ITY LEVEL RECORDS

o

CO$ITI

ASSESS0R 0FFICE . . . . . . . . . . o . . . . . . . . . . . . . . o . . . . . . . . . . . . . . ! . . . C0mmY COURT SISTEM . o . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . REGISTRAR 0F VCIfERS . . . . . . . . . . . . . . . . . . . . . . o . . . . . . . . . . . . . . . . . . . . ... . . . . C0IINTY C0R0NER ........ r... o.............................. o.......... CotlNTY SHERIFF ....................................,...........!...... STATE-IEIEL PUBTIC RECoRDS ... ...... . ........... . . ... . ... ....... .... ..,.. . STATE REGULATION OF BUSINESS RECORDS ............ O ..". I..' "".. ".. srATE CORPOMTE cOMmssroNERts oFFrcE C0RP0RATE OWNERSHIP CAN BE MASKED ........... ...................... .. TIIWARTED DISCL0SURE MAITIEWERS ....................................... ' REGTSTERED AGENTS AND TNF0RI'{ATI0N AccEsS ...........o................ EITIPL0YEE SMETY REC0RDS . . . . . . . . . . . . . . . . . . . . . . .. . . . .................. STATE LEVEL LAIil ENF0RCEIt{ENT RECORDS . .... . ... .. .. . .. . ... .. ...,.. .. ..... . . . DMv DRIVING RECORDS . ]. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .............. Dlt{v REGISTRATION DATA o.............................................. STATE POLICE 0R HIGHWAY PATROI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .....t.. INFORHATION RELEASE - PERJIJRY ...................................... . STATE TAXATT0N RECORDS ............................... r......... o........ ' BIG BROTIIER: THE FEDERAL DATA FILES .........'.............,.............. FREED0M 0F INFORilATION ACT .... . ....... ...... o. ............. ...... t .. UtS P0STAL SERYICE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . o . . . . . . . . . . . . . ' THE QUICK & CIIEAP I{AI TO FIND FORWARDING ADDRESSES ...t.............. TRACKTNG BOx H0LDERS T0 THErR STREET ADDRESSES........... ... o .. .. ... . UPS RINGS T\ilICE o............................ ' " ' '................... FEDERAT C0URT RECORDS .................................... o r.............. BANKRTIPTCY CASES .................................................... FEDERAL CRIMINAL REC0RDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..... A 'ts0ltETrl'mstt TNVESTTGATTVE EFFoRT sAvER .............tt..........i.. INTERNAT REVENUE SERVICE .. ... . . .. ... .... ..... . ... . .. .. ... .. .... .. . ... .. . . MILITARY L0CATOR SERVICE ...............o............ o................. !.. FEDERAL COMMI]NICATIONS C0MMISSION ........... o............................ FEDERAL AVIATI0N ADMINISTRATION ................... ....................... ALC0H0L, TOBACC0, AND FIREARITTS ............................ r........... o.. SECURITIES EXCHANGE COMMISSION .....,t........ '...............,............ G0VERNMENT PRII'ITING 0FFICE ......................................,........ NEWSPAPERS AS A S0URCE ...................................................

...........................,...

................................................ .' . . o. . . .' . . . . . . . o . . . .

TELEPHONE C0MPANY SOURCES SOIIRCES YERSUS A BASIC TOOL . . . o . . . . . . . . . . . . . . .

CONVEI{IIONAL 4LL INF0RMATION . . . o . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UNPUBLISIIED VERSUS UNLISTED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....... I'EMERGENCY'' SCAI.{S AGAINST THE UNPUBLISHED BARRIER . . . . . . . . . . . . . . . . . . . cNA NIIIttsERs BUSINESS 0FFICE SCAIT{ CNA NAI'{E 0R NL}'tsER SCAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

o................................... "................... .................o..............................

PTIBIJSHED BY BDEI{ PRESS

lv

15 15 15 L6 L6

16 16 L7 L7 L7 18 18 19

t9 20 20 20 20 2L

2L 2L

22 22 22 22 23 23

24 2!+

24 25 25 25 25

26 26 26 27 27 28 28 29 29 29 30 30 31 31 31

31

32 32 33 34

SECRET AGE}IT

TABLB OF @I{TE[TS: YOUII{E 1

... ............

. . . . . . . . . . . . . . . . . . . . . .. t . . . . . . . . . .. o.. .. . . . . .. .. TELEPIIONE TOLL CALL REC0RDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . o. o.. . BUSINESS OFFICE TOIL RECORD SCAM CNA CRISS-CR0SS SCAM . . . . . . CABLE ENGINEERING OFFICE

..

...

o

... .... ..... ..... ....................... ....... METHOD 2Z A SURE WAY T0 PRISON ......... . .... ....................... THIS SCAl,t WILL ONLI C0ST TIME & TOLI CIIARGES ........................ .... ...................... SCAI,IMING SPRII,IT, MCI, Ef, AL .................... II0I{ T0 FIND TIIE HIDDEN LONG DISTANCE CARRTER ........................ SIIBVERT A TELC0 EMPL0YEE .....................o.......'..........o..r..... OTHER ATIERNATMS ...............o...,................................... o... o o..... ................ COMMERCIAL S0URCES 0F INFORMATI0N ............. CITY DIRE0IORY . . . . . . . . . . . . . . . . . . . . . . . o . . . . . . . . . . . . . . . . . . i . . . . . . . . . . . ............ CREATIVE USAGE 0F THE DIRECT0RY ..... .,...............,.. CRISS-CROSS DIRECT0RY . . . . t . . . . . . . . . . . . . . ., . t t t . . . . . o . . t . . . r . . . . . . . . . o........ BUSINESS GUIDE T0 CORP0L{TE EX.ECUTI\ES .....'.....r......... NATIONAL DIRECTORT OF ADDRESSES .L\E TI*EP5O!{E n}BE35 ... . . ... . .... .. INDUSTRIAL TELEPHONE A$D ADDR.ffiS DIIItrCFJES .,.. ] E.. " " t..... O.... . S0URCE VALTIE 0F SALES RPRFSil{TfTfTES .o.....r!.......'......o.......o'... oo........!...o.or.'rr.t..............o GENEML SEARCH FIRTS r...........o. DRIVING AND ACCIDffT RECORIG .............ooo.........!........o.......... CREDIT CARDS.Lt{D CREDIS REF0HfniG ffiBEIUS .r.r.......oorrr.r.............. o.. r o t...... c ! r............... o............... PI"ASTIC lrOf{EI ........r CREDIT REPORTII{G BUREAUS .............................................. '.. ESTABLISEII{G YOUR SN U}TDERCOVER CRB STIBSCRIPTION . . . . . . . . . . . O'''' r . . o.............. PRIVATE POSTAT SERVICES ........ r o......................... HITMAN SOURCES VIA TNSURANCE AND EMPL0YIIENT TNQUIRTES ............o........

v.

VI.

35 35 36 36 38 38 39 39 39 40 40 40 4L 4L 42 42 42 43 43 44 45 45 46

46 50 52

IHJ'PHONE SYSTEITI . o . . . . . o . . . . . . . . . . . . . . . . . . . . r . . . . . . . . . . . . . . . . . . . . . . . . . . . . LEGAT C0NSIDERATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . o . . . . . . . . . . . . . . . . WHAT JUSTIFIES THE INQUIRY? . . . . . . . . . . . . . . . . . . . . . r . .'. . . . . . . . . . . t . . . . . TECIINIQUE; AGENDA; S0URCE LIST .......... r.......... r................ . .. ICEBREAKER; FIRST PIIASE; SOURCE CLEARING HIS THROAT ............. THE BRASS RING; RIGHTE0US INDIGNATI0N; SPEED ..o..r...o o.............

54

FINANCIAL INFORMATION .................................................... AN OVERVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . o l{HY B0THER? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . TYPES 0F FINANCIAL DATA ...................r.............................. FORMS 0F FINANCIAL ASSETS AND LIABILITIES ................................ MHIHODS 0F ACCESSING FINANCIAL DATA ...................................... ACTIVE AGEM-IN-PLACE . . . . . . . . . . . . . . . . o . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . TI{EFT, BY ANY NAIt{E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RECRUITI'IEI.IT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

58

DRAI{fBACKS AFTER RECRUITMENT HANDLING AN AGEI'IT IN PLACE DAMAGE C0NTROL It{ETH0DS . . . . . . . . . . . . . . . . . . . . r . . . . . . . . . . . . . . ., . . . . DIDNIT PR0MISE A ROSE GARDEN J0INT AND CO0PEMTM EFF0RTS . . . . . . . . . . . . . . . . . . . . . . . . .' . . . . . . . . . . . . . PUBLIC RECORD . . . . . . . . . . . . . . . . . . . . r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

63

........ ... ...................'..... o.... ................................ .......... r........ .... ...... ....

I

T0 GAIN FINANCIAL INF0RMATI0N ................................. THE ttWILt IT CLEARII SCAItI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . o.!..........'......... THE FRIENDLY L0AN SHARK SCAIT{ ............

SCAI'IS

SCAI!'IMING A BR0KERAGE ACC0UNT SCAMS WITII CREDIT CARDS . . . . .

PTIBIJSHED

lill

...................................

..............r....................

BI EDEDI PRESS

5A

55 55

s6

57

5t 58

s9

61 61

ot

ol ot o.i 64 64

6A

6s 65

6s 66

68 68

SEgRSf

AGENT ,

TABLB OF CUITEIITSs VOIJIIB 1

FIND TIIE MIIAER SCAM . .' . . . . . . . . . .-. . . . . . .. . . . o . . . . . . . . . .. o . . . . . .

................ .... ........ .........o..............tr.................o.... ........ ............................. RECORDS o................................ ........... FINANCIAL ANALISIS 0F t.... .. GOVERNI'{ENTIS USE . . ........................................... PRIVATE OPERATIVETS APPTICATI0NS .......t..o......o.................. IIOW fiIE AI,IALISIS IS CONDUCTED ...........o................................ o............... AN ADAPIED EUHPLE .................o................ r. . FUNDS APPLICATION 0F r...................... ...... o.... AND SOURCE NEI I.IORTII - HIPENDITURES ANALYSIS ......o...............o..'........o DgfEgtING AND I?ACING HIDDEII OWNERSHIP INTERESTS ......................... TRAVEL AS A C'I,UE TO EXISTENCE AND IOCATI0N ........,' o.......... .... . . ......... .. INTERCEANGE DATA .. . . .... .. . ........ ...... r.......... AGIIVITIES ACCCIjNT ......................................... CHECKING ..... .... ..... .. ' . ... .. . . ANALYSIS OF DEPOSITS AND IfITHDRAWALS ............ ....... .... .. .. DEPOSITS ..... OF . o. .... ................ .. .. . ANALYSIS IfTHDRAWALS DMWN] 0F .............................. ANALYSIS [CHECKS t............. r............ o......... CASHED CHECf,,S o................o o..........................o......... TRUST ACCO$ITS ...................... BR0KERAGE ACCOLI{TS '...................................................... F0REIGN BA-XK ACCOUI{TS ...........................o........................ TRANSPOBTITIOil 0F CI.IRREI{CY ......'.................................... PUBIJC IJi{ 91-5OB . ..... o............................................ INF0RIIAL XETEOffi 0F 0BTAINING INF0RMATION ................................ PUTIII{G F.il{L!{CIAt AIALYSIS Il'lT0 PERSPEGIIVE .............................. N0llI TEAT YOUf\ry &tUGi{T THE CAR ..........o..o...........!...o............. r............... VII. PHYSICAL SIIRVEILLA"{CE .. o................................. TYPES 0F PHYSICAL SIJRI[EILLANCE ........................................... FIXED SURVEILLANCE . . . . . . o . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A SPECIAL CASE: BREAKING & ENTERING ............,...,......o........ FRIENDLY LOAN SHARK COLLECTI0N SCAM BREAKING AND ENTERING SEEK THE ALIERNATM FIRST

o

M0VING SURVEILLANCE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . o' . . . o... C0MP0SITE STIRVEILLANCE TECHNICAL AUGMEI{TATIONS o. DECOY, DECEPTI0N, AND DISGUISE DEC0YS DECEPTI0N

.......................................... .................................. '.......... o......... ............. .................. .............................................................. ........................................................... o. r.. o.. o...................... r... rr.......... - DISGUISE ..... r....... WITH TARGEf, TIIE ......................o............'........o.... MINGLING BMSS BALLS AND MANNERISMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . WH0, WHAT, AND IIIIIERE o............................................... . '......... PLANNING A SURVEILLANCE 0PERATI0N ........ ........ ............. 0F INF0RMATI0N ..................... o

WHAT: ESSEIITIAL ELEMENTS [EEIs] WHEN: AS A PITANNING EL${EIIT . . . . . . . . . . . . . . . . . . o . . . . . . . . . . . . . . . . . . . . . I.JHERE3 OFTEN A DIFFICULT QUESTION ..................................

WI[Y: THE EXPANSI0N ELA'IENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

PLANNING FOR

'

LOGISTICS: BE

PREPAREDT

....................................

SUPP0RT DTIRING SIJRVEILLANCE OPEMTIONS ...........o....................... o....... r...................... INFORMATION SUPP0RT .................. o. .. ... ....... .... ,.... ............... C0ORDINATI0N SUPPORT .......... BACKIIP SUPPORT

o..............o............ .......................... a..... a.. a..... a....aa....a.......... r....a.. ...... ... ............... o............ ... . .... ....

RELIEF ................. 0PERATI0NS CENTER ROLE . .

PUBLISIIED BY EDEN PRESS

t

vL

69 7A

7L 7L 72

72 72 73 74 75 76 77 78 80 80 81 81 82 82

'83

84 84 85 85 85 86 86 87 87 87 88 88 8B

88 89 89 89 90 9L 9L 92 93 93 93 94 94 94 97 97 97 98 9B

98

SECRET AGENT

TABLE

Of ffilTEIfIS: YOUHE

1

......o..............o....................... ............................... ] ....... .... .... .... ... ........... .......... ... ..... ..... ..... ..... ... .............................. ............................ ...................... .... ............................................. KNOW TIIE IJt'IMEDIATE AREA ........o.................................... ESTABLISII G00D COVER FOR A VEIIICLTE ..................'............... OBSERVATI0N POST TYPE C0VER ............................t..o..............

CS{MUNICATIONS WITH THE FIELD LEGAL MEIHODS 0F MDI0 C0MMUNICATIONS otHER SURVEILLANCE CoMMIINICATIoNS I'iETH0DS I MoDIFIED CB UNITS AND A LUCKY BREAK [NEW CB UNITS] .. .. .. .. . .. .. . .. . . . B00TIEGGING 0N 2 METERS BAND B0OTLEGGING 0N TIIE CIVIL AIRCRAFT SUMMARY C0MMENTS: STICK WITH TIIE CB BAND .. .. AN0flIER SURVEILLANCE RESOURCE: READY FUNDS RTINNING A FIXED SURVEILLANCE

VISUAT COMMAND . . . . . . . . . . . . . . . . . . . . . . . o o .. . . . . . . . . . t t . . . . . . . . . . . . . . . . r....... t............. L0Itl N0ISE ENVIR0NMEI.IT ........................ ' ........ . . .... ... ....... COVER FOR TECHNICAL DEVICES .................

HABITABILITY .............................................. SECURITY ..........................................

o.........

oo.... !. t......

o..

......... .... ...... ................ ............................................... .........!..................'t....o............ ..... .. . .. o... '.... t............... .........................o........... r r... r........ FOLL0ffiNG 0N F00t ........................................r. !..... t..... o. r.. FOLL0WING BY AUT0 .................. r................... PR0GRESSIVE AtlTO TAILING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . r . . . . .' . . . . . ........ THE PARALLEL AUT0 SURVEILLANCE METII0D ....................... CIRCLE LEFT PARALLEL WITH F0UR UNITS . ...... .. ....... r.. .. r r.... BR0KEN PLAY3 BLOCK U / RIGHT TURN ....r..............r....o.... BR0KEN PLAY3 C0NTINIIED BL0CK U .............rtt...o..o......... PAMLLEL SIIRVEILLANCE DEFINITIONS ... '.. r o.... r.......... 'o o. o.. SUMMARY OF MULTIPLE PARALLEL SURVEILLANCE .... .. ..... . .... ...... THE SANDWICH SURVEILLANCE TECHNIQUE ................................. L0ST TRACK: ABORT 0R SEARCH? .........................,......o........... THE RIGHT TURN SEARCH THE0RY ...o.............................r.r...o..... IIHAT IS THE IIIGTIEST PROBABILITY SEARCH PATTERN? ........OO""""... r..,......., . SEARCH ZIG-RIGHT M0VEI"IENTS .'...................... HOlttE T0 DATI]M . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .' . . . . o' . . . . . . . . .

r. OBSERVATION POST C0MMUNICATI0NS CREATE YOUR OWN MDIO C0DE USING A PAGER IN fHE FIELD IMPROMPTU FIXED SURVEILLANCEs THE COMP0SITE SITUATI0N P0SITI0NING YOURSELF

o

EVASION TECHNIQUES ........................ r..... o. !. r...... AWARENESS OF A TAIL CLUES TO TARGETIS INCREASING A W0RD 0R TI|IO AB0UT AI'{BUSH I'IIEAP0NS: ASSET 0R LIABILITY? OTHER CONSIDEMTIONS OF THE SURVEILLA}ICE BUSIilESS P0CKET LIITER

t.. ' t r........

...rt......t........ ............o...............o...o.............. ............,.o............t,............... .,......I"""..'t..O" r.......... t....... t........ ........................... o........... r.....r..r................. COVER TELEPHONES ............. REPORTING F0RMATS AND CONTEIITS ..........o....r...r....r............. INVESTIGATM DATA SHEEf, . . . . . . . . . . . r . . . . . . . . . . . r . . . ., . . . . . . . . . . !................... CHR0NOL0GICAL DATA SHEEf, .'.....,.....o..... r.. r'......'... !............... SUPPLEIT{EI{TAL DATA SHEET ..'...... GENEML N0TE AND REP0RT WRITING STYLE .......................... ELECTR0NIC N0TEBOOKS .......................... e..... '............... .................... POSITM IDENTIFICATION ....... .................. INVOLVING LOCAL LAW ENF0RCEMENT ... '................................. .. .... . r........ ANOTHER IMP0RTANT T00L 0F THE TRADE: KEVLAR ............. PUBLISHED

BI

EDEN PRESS

Yil

98 98 99 100 101 LOz

LAz 103 104 104 LO4

106 106 LO7

L07' LO7

108 108 109 110 110

LL2 LL2 113 114

LL4 115 LL7 118

L20 L20 L2L L2L L22 L23 L24 125 L25 L26 L26 L27 L29 130 130 131 131

132 133

133

L34 - 134 134 135

SECRET AGENT

TABIE Of

@IUEIIIS: YOIJIIB 1

VIII.INFILTRATION AI{D I'NDER,COVER A SI,BTI.E DISTINCf,IoN

ASIIVITIES PR0V0CATI0N DOilIT OVERIOOK LIABILITY SETTING UP AI{ III{DERCOVER I{ORT ASSIGNI'{EM FIRST: JUSTIFY I,JHAT IS T0 BE GAINED SECOND: DEVEIOP A PLAN 0F ACrI0il ...... TIIIRD: RECRIIIT, 1?AIl{, AND INSBRT AN AcEXtT ....... FOllRIl: MANACB TIIE AGENT AND CIOSB IT DOI{N ........ EVALUATING TIIE TArE SHIITTING IT DOTil u. PoSTAL Al{D UAIL .. AVOID LEGAL HAflE PITFALIS WoRDING TlrE TErI 0F yoUR TETTER . covER ADDRESSES ...... BEWARE 0F TIIE POSTAL MSPECmRS TITE POSTAL TRAPS TO AVOID ..... X. THRU XIV. ........ PUBLIC IMAGE OF IINDERCOVER LOSII{G YOIIR CASE: ENTRAPI'IENT &

xv. BrBLroGMpHy

............. ...

cIossARY xvrr.rNDEr xvr.

1

148

APPE{DICES:

OFFICES ......... COI'IMISSIONS CENTERS REC0RDS REC0RDS OFFICES DIRESIORY OF STATE TAX RECORD OFFICES USPS F0nM 1478: FOIA REQUEST FOR ADDRESS SEARCH ... BOXHOLDER DISCIOSURE FORMATS INTERITAL REVENUE SERVICE FORU 4506 DIREGTORT OF SELECTED FEDERAL AGEflCIES AND OFFICES TELEPIIONE COMPANY CNA MN,IBERS LISTING OF DIRECTORY PUBLISHERS CREDIT INDUSTRY DIRECMRI INTERVIEW I,I0RKSHEET AMERICAN BANnNG ASSoCIATTON NUI"IERICAL SySTEt .. USPS FORII 1583: DETIYERY 0F l,tAIL THRU AGENT cor'rMoNly usED RADIO CODBS ... INVESTIGATIVE DATA FORMATS DIRECTORY OF VITAL STATISTICS LISTING OF STATE-REGIILATED BUSINESSES DIRECf,ORY OF STATE CORrcRATE DIRECTORY OT STATE OSIIA DIRECf,ORY 0F DMVg DRMNG DIREOTORY 0F DMVg REGISIRATION DIRECTORY OF IIIGI{WAY PATROL REPORT

PTTBLISIIED BY EDEN PRESS

t

147

.............231 VOLI]ME

A. B. C. D. E. F. G. H. I. J. K. L. M. N. O. P. a. R. s. T.

...... 137 ............. 137 .. ........ . 137 ... L37 ......... I38 ....... 138 ...... 138 ... 139 ..... 139 ..... 140 ................ 142 .... L42 ........... 143 ........... I44 ............... 144 .... ...... . 146 ............... 146 ... 146 ......... vo1 2

YiLl

............ 161 ....... I81 ... 182 ........... 185 ....... 188 ..... 191 ..... r95 ............. I99 .......... ZO2 ..... 2O3 ... 2O4 .......... 206 ....... 2L4 .... 2I5 ........216 ....... 22O ............. 221 ... ZZ3 ......... 224 .... 229

SECRET AGENT

PUBLISIIER

I

S

I'{TRODUCIIOI{

T}' s vork proves to be far more than another best-se11ing book. rr is the penultimate reference nanual 0n domesEic obtainableanyvhere for any price. The. auEhorrs previous book rpBRSolrAr,""pion"g. bu"srr-isT;iiv;tf,l'i;" -i""ia" 'i-"irrii"a# an insranr success. The susrained demand poinrs ro Bil l ino i.yJ" of rhis culr

of clandestine practices.

Eden Press recognizes t.his demanrr as further proof thar pRryAcy is an important issue in todayts society.. rn factr rs matter a of increasingly serious -prlvacy concern and waning st.rength as each'day pu""L". nsEcRET AcElrrrt dirrnrt come-

easily. hhen iie:: ?ress first suggested to Bill thaE he should. wr.ite Ehis toot,',ne-tora us io,,Eo s:ralaht Eo he11.rr IJe counEered vith our own logic. we berievl thJ tnose ..ho :r:r: privacy on a wholesale basis vi11 continue J ao r:th ="11.:*"ry violate ir:::u: e: "sEcRET AGBNT.T lrlhile Eden Piess is every bit as zealous oiou. p.i".:r "o as :-:e;.:ex: person ls his ot{n, we also realize that alerted Eargets a:s ia: _or" :.:=....r:a :r':.r:t about very

Lhan are

sitElng ducks.

Frankly, technology and the prevzlLi:r3 a;c:3.1::y 3f jc,:esl:: es;lonage is so formidable that we are truly frighce,:e:. Btl i ::a1f-;ox:ng1y :e-1s u_. ',jusi c".uu=" they are out Lo get you is no reason:o be para:toi.C." Th:s is r.aj nas of saying :h?! looking over oners shoulder, ?s j.t rcr€r is a sensible pracEi'ce io jereioD. rd; believe it

now more Ehan ever.

question, then, is ho* do we alert Eargets Eo their vulnerabi. lity? one is bv telling Ehem in undeisiandable rayrnanrs Eerms jus! hoy the professional" pr".ii.e thei-r rradec."ii.Gu", Eden piess pryor have teamed up once again to presenE yeE another imfortant ""a-ilirr toot or-p.i"".y, The

obvious ansuer

As publishers and booksellers, Eden press is anare of wha. is avairable on the nar,ket today.- Through our professlonal assoclations .na --il" authors, ve also have good insighE irto what is in-the wirhltt".-p-riti"i"." offingr"nged Bill to creat.e a book that is accurati, practical, and factuar. "'r.,lr than anythlng avallable no, or EhaE ,rtt u""or" avallable -- a book that i.s beEter ln the future. SECRET AGEIIT reveals.everythlng about professlonal methods and devices. It is not a t.rip through Walter MiEtirs dimain __'_ it is a brass real world secret agents. private in vestiga rors, vernnent knuckles discusslon of lnvestigators, and even lnternatlonal .Deratives- No stone has b"een -ieft -go unturned, no. spared. SECRET lcrxr is dra*n iioo i"*ii;;i;;";;ni "ni effort hands-on evarua.ion of devlces, extenslve intervierrs rr .p.i.tfr"" ]""-ia "*p"ri"n"e, research of subjects found only ln "ConfldenElal ie"r"y U"" Oif ".-"."fr1 - Offlclal on the narket ve knon of, {,-"**1".-- ;;I;'"r.dJ""s anrrhlng and has reieived iop-.cior.ae"-i.;, iioiii"ron.r"r

rt ls Eden press' and Bill pryor's jolnt berlef that sBcRET AGENT vi11 a1low you to strenBthen your own privacy tip.or" your resistance to un,arranted ln-trusions. By anybody Lnd a-ny agency.' "ria i;o;d". ro acconpllsh this, Iou have r,o knoH hou operatlves work; SSCRiff AgElrI tells you. Good luckl Barry Reid, Publlsher June, 1986 PI.IBLISHED BY EDEN PRESS

L

SECREI .r"GElff

DEDIE,ITIOT

To my Family:

They have Ehe strengEh and

PTTBIJSEED

BT EDEil

PRESS

will to persevere

x

t

SECRSI AGENT

*** I

had mlxed enotj.ons about this wriUlng assigment for several reasons -- the sun of rrhich ls that my profeesional career has been on the counEertseasurea side of the problen for alnost twenty-five years now. I Eust acknowledge that I had conslderable concern with rritlog the details of Ehe actiye counterpart to oy profession for all to exploit. This concern ras best e:emplifled by the theme I had set in TTPERS0NAL AND BUSIIESS PRMCY."

Publlsher Barry Reld ia rrot an easy rErn to conpete yith Ln matters of loglc, as the very exi.atence of this book underscores. He erpressed his opini.on thaE [y earller book, |?ERSONAL AND BUSII,IESS PRMCY,TT did an ercel lenr job of explalnlng the questione of WHY? and WHAT D0 I D0 ABOUT IT? to the Eypical non-technical buslnessnan. But I didnrt dlscuss HOW? invasioo of privacy is accotsplished ae thoroughly as tt perhaps should have been.

This shortcomi.ng caEe as no surprise Eo !e -- it yas aa iit.eniional declsion based upon keeplng the task of yriEing ?RIT.{CP oa.na3eab1e. -|ad, I trust also adnit that I was hesltant to turn that effort i.q.!o a! erercise i:' "lrrobology." As Barry points out, the arcaae prac!ice oi iaraCila s3n€a3e eisers privacy w111 go forth nith or yithout this boolq l.lat vonrt erist, iorerer, riEhout iE is a comprehensive discusslon of hor private operatives, goyernreet a?eeEs, aad business spies ply their trade. Thus, I becane convinced Ehat there U,as bou\ a :eed for this information to be broughE Eogether, and justiflcation for oe to rake tlis effort.

If you wiLl look back ats IIATERGATE for a nonent, you must recognize the study ln conErasts that blemish upon our hlstory portrays. 0n one hand, advanced electronlc surveillance IES] devices rrere planted by educated, experienced, and skl11ed operatlves. 0n1y because the devlces failed, however, did the il1-fated second foray

into the

Democratic National Headquarters ever occur.

0n the other hand, Washington Post reporters Bob I'/oodward and Carl Bernstein aEaLeurishly explolted non-electronlc surveillance methods in investigating this episode. They succeeded ln toppllng the Largest lands 1lde-lnsta11ed presidency ever eLected. This, in a cynical way, shows the incredlbLe power of non-ES methode.

Wtit. I

wonrt suggest a para11e1

ala the unresolved controversy of a fight

between Ehe heavywelght boxing champlon and the worldts urestling champlon, f must noEe that ES and non-ES Eethods are each powerful beyond a laymanrs conprehension. Our joint obJective, therefore, is Eo explore both itelds to the ends of greater kaowledge and understanding.

Because ES and non-ES Eethods are technlcally separable, even though in practice the two are usually joined in a powerful nanner, we have elected to oake this book inEo two volunes. Volume 1 treaEs non-Electronlc SurvelLl.ance subjects ln detail, rhl1e Volune 2 addresses Electronlc Survelllance methods and devicei. Each volune ls intended to stand 61one; Ehua, you wilL find separate tables of contents, glossaries, and indexes ln each.

I have drawn upon experience, knowledge, and advlce of several operative experts in order to brlng SECRET AGENT to you. Each has requested anonymity; I acknovledge thelr contributions and sincerely thank then accordingly. Bill

PTIBLISHED

BI EDEil PRESS

Pryor

June rl

1986

SECREf,

PUBIJSHED BY EDEN PRBSS

ffi

tLL

iilffi

.lrirlll,i i:11

liitr,tii:iiiiii;r, il

SECRET AGEIIT

SEgtlott

I:---DIsGrtrm

a mRp gr gaurp!, El

BEApERS aNp UsERS:

This book is written, edited, and publlshed by those qulte knowledgeable 1n the nethods and technology of surveillance and lnvasion of privacy. t'le are not attorneys and our understanding of United States and foreign laws is based solely upon our cumulative experlences. Thue, re do not offer 1ega1 advice herein. Professionals such as Government Agents, Prlvate Investigators, Skip Tracers, and Attorneys are eubJect to strict governnental and association . codes and regulations pertlnent to their professlons. Whether they observe those regulatlons is not only a natter of indivldual Eltuatlons, prosecution of violati.ons seena to likeelee be a case matter. Thus, becauee the FBI or DEA can ttget awaytt wlth il1ega1 ulretaps and black bag Jobs does not constitute 1ega1 authority for prlvate cLtlzens to attenpt to do so as Yel1. As you will also learn fron a careful reading of SECTIoN III enEitled THE LAW, certein evasions of one federal 1aw are ignored as loopholes in another are exploited by federal [and on occasion, by local] 1aw enforcement agents. Private prosecuted for alEeEptiag to slither through cltizens, however, would certaialy be rrconnections those sane loopholes. Unless one has rtr that ii. We caution you, therefore, that rre nej.ther assert the legality of any nethods described Ln this book, nor do ve advocaEe any usage without competent 1ega1 advice.

Irrespectlve of your interests in reading this book, the author, editor, and publlsher unequivocalLy dlsclain any responsibility for darnages resULting from or the consequences of your having i.upleoented anything contained in this book. IN oT!ER

WoRDS, DoNfT D0

SEGIIOII

lgE CRiyi t9 Tou cA,{'T

II:

DO

IIIE TIyE

IXTKXIrcTIU{

oNE P1'RP6E

l!

r{L\p

SECRET AGENT is wriEten for one purpose: :o 5rt:g a coapleEe sourcebook of non-nilitary survelllance and intelligence :a:heri:g aethods, techniques, and technologies Eo the marketplace. I,ihy and hor rcu use -'ie infornation in thls book is your business, and you alone reap the frui.ts aad bear the consequences. HARDI{ARE REMMMEI{DATIOTS ATD Ef,DOBSEHET{TS l-r--

The author and the publlsher have carefully surveyed the marketplace in search equipment and devices. In SilTICli IIII we present our evaluatlona, caveats' and reconmendations. As discussed i:r oore detail there, the endorsendnts ve make ln this book result from our orn hands--on experiences wtth the equiprnent in questioo. HhiLe both favorable and unfavorable reports are clearly our olrn oPinions, we have undertaken to be objecEive and candid in order to be of useful

of the latest

BerYice

to

you.

INTRUSION II{ITO ANOTHERIS PRIVACI HAS BECOME ACCEPTABLE

I'Ie are bleseed rith life in a soclety that has grown to accepE intrusions Lnto lta Eost secret inner sanctuns as a matter of course. We are now used to hlgh PTIBLISHED BY EDEN PRESS

SECREf, AGE}IT

presaure telephone aaLeaoen denanding and prying in euch a rurnner thaE ofle nust be dornright rude ln order to evade an$nering thelr questions. I{here are you enployed? How nany bathrooms do you have ln your home? Do you enJoy danclag? Do you own your home? How nany children do you have? And so lt goes.

EUAISIA!

EIL8.S

Sonechlng as sinple as appJ.ylng for a courtesy check-cashing card aE the 1oca1 supermarket touchea off an lnquisltlon that r{ould have made King Philltp the Fair

envlous. Loan appllcations at banks are nor several pages long and demand information far in excess of anythlng pertlnent to your abillty to repay the loan. HMICAL EIIES

Try a visit to a different doctorts office sometine, but plan on spendi.ng at least 45 minutes rith forns and questionnai.res which have nothing to do with why you are in to see the doctor. A liEt1e probing ri11 grudglngly reveaL that every piece of data you provLde plus rhatever the doctor adds to the file may well rind up in an extensiv6 nedlcal data coopuEer systen sonewhere ... and you wontt ever be allowed to see iEportant aections of that filel @HPIIIER-AIDED INITUSIONS

A recent Congressional report !/ nakes Lt clear that networking of conputers their respecti.ve data bases can make your ent.ire life and even your present actlviEies available to hordes of bureaucrata at. the push of a button or two. But the systen doesntt stop there. Medicare subscribers Idoctors and clinics] access portions of this network that relates pereonally to your individual medlcal situation as well as to nany statlstical files concernlng your ailnents, cosEs of treatnents, nedicines prescribed and your reactions to them. The glaring discont.lnuity is that vhether you are old enough for Medicare coverage is essentlal ly ignored --- your patlenE file information is dutifully cranked ln and

anyway .

AN OCTOPUS BUREAUCRACI

Coupled

wlth IRS, FBI,

SEate Departnent, Secret

Service,

OSHA, NCIC, Department

of Agriculture, Departoent of Defenee, CIA, and dozens of other alphabet soup bureaucracles, governnental computer files provide incredible access into private infornation. In goverrunentrs headlong rush int,o conbating crine, we are beconlng a lrue natlon of OrlelLian 1984 inhabltanEs. IHESE

FACTORS

ASSIST ITIE HODERN-DAY INVESTIGATOR

become so used to intrusions lnto thei.r private affalrg, actlviEies of those who undertake to access lhese details are made conslderably easler. Because reslstance is essentlally zero in many cases, an investlgator can p1y his trade with unwittlng cooperatJ.on from his target. 0r from infornants vho often hold the key to unlocking the mystery created by a target who has becone sensltized to the threaE and has lnplemented evasive noves.

Because

--rpublic has the Anerican

llz Ref 28, pp 67-72 PTIBTISHED

I-

BI

EDEI{ PRESS

2

SECRET AGEilT

flBE Ig ILYATS A SUBmA r{Em AI Erm There cones a tine in alnost every personte life at whlch a little knoxledge about sooeone else ls useful, or even iritically i.Eportant. Wt bueLness6an is trackiag donn a deadbeat custo'er, investigatlons are unde.n "1f,".-. ay to support lavsults' an ex-spouae-is seeklng noney or cuJtody, o" a protaie att.orney rs attenptlng to locate legitlnate heira Eo a reclusets f;rtune, nidern society deronds that avenuea of informatlon be nade available on ao ever-increaslng basls. An exhauetlve Ereat,ent of I{HY soneone would t anE to prr into anotherrs private or bueinesis life ie given in iPmsoilAl" AND BUSINESS pRIvAcI. .ra:.ratie-irom Eden preas. rni-a 1s nandatory background infornation for any iayestigator to know. !/ fltrT-TO-DISIPPETR BOOLS CDHP(XND ITYE;TIGAIIX,IS JQE

Excellent booke are non available which insEruct a persoo step-by-step how to toEally cha-nge ldentlty, dlsappear, and becone ,untraceabi.e." e.i"e'.ibng these are the Ewo vol,umeg of rrThe papei Trip" Barry-thi.s Reid. 2: !' 2T- 5_/- I,re are not -by concerned rith norality or motj.vations in boof oi-viy-oneo'aight want to dlsappear, for reasons are as nu'erous and as justifie{. :::. 3.opr= rho actually pursue those Eethods. I{e-are conceraed, ios:Jad, ?i.:: :ou "= al ilrestigator Eight penetrate those veils of illusion aad coocealxot. HfRSr. A SE!{rfrrlcs t.Essil TARGEIS

or organization about whom we seek information is caIled a target a rabbit in the crosshairs of a rifle is a target.

The Person

much as

IT{VESITIGATORS

Those whose mission it iB to uncover infornation about -'sy are often referred ,to as- investigators' analysts, researchers, or op"aulir"".targets nane and for anv Justification, rhese people ieek ro colleci ;;;-;;;i;;" iifornarion ""y in pursuit of their obJective agalnst [or occasionally in aid] of

"'t*g"t.

sotrR@s

-Persons-who provide infornation are ca11ed sources, i.nformants, reporting parties IRPs], or cooperative_ parties. These descriptore are oiien amp:.ified by suci ternsr among others, as ttieliablerrr ttwe r l lnf ormedr,r or tturrproven.rr rn this reserye Ehe EerE "source" to ."f", ;; .;';; being raEher :::I,^T-rill_ge,nerl11y Enan sone other device or method. RECORDS

repoaitory of lnfornation about rarget. 1i,es wirhin the __,..-9n:.ai:Iedib1y,wealthy nedluo ot records' data files, and the electronic word. I,Ieaconeider files such as existed prio-r to i,p-l enenta t,ion of the computer as well written as computerEaintaLned files as rrrecords., As will be developed ln this book, mosE cases an invesEigator works on conslst nore of record.s t-rr"n of lnfornaiion developed thrciugh Eechnical and physical 6ethods.

Z/ Ref 11, Section I;

2/

Ref

4i L/

Ref L4i

PIELISHED BY EDEN PRESS

illflllt,1]1ilil!l!illiiljlllll1Ilt]:l.',|,']i2l[l!llll

1/ Ref 15; 9/

Ref

16

SECREr AGENT

ItsTf,ilICTL UEIEOIE

audio and collectlng lnfornatlon ranging fron e1-ect-ronic may call one I{hi19 to .Jif-t" ."tiiia" to d"f".s J.."t video suryeillance tttechnical gatherlng "itt"'"' of nethodrr a ,r'ource,n There are neans of

considering ," .."-i..fij this a refer Eo informatlon from targets ."i-"-o"'r'""" .fif.". in context, ne 'ril1 Pr-9per1y ;iiilffiffiry;iGa;i;i,';i"Jr,"rq-"?orrrtechnicalpenetratlonrrinthisbook'

Physlcalsurvelllancebyanlnvestlga.torconnotatesanlnpresence'coYert -Jn is ins'ltuted' or a sltuation ls

nethod of garherln. i"roiriiiJi. "in". brought under survell rr"[--ti-ir"erttoo

"""taifi an undercover agent, rre are generally of concernedxlthahulanbeinguslnghlsoi.nIla'turalsenses.Thel.nportanceofthis wilf il'iiZ oiri.. Beanlng later on. In context, we vi1l refer to subtle distlnctfonrrphysicaltr in this book' this category as IEEEglEJErsgDs

ThetelephoneisaporrerfulinvestigativeEoolandwtllbedisctissedinitsown ana waitrng hours are saved each vear bv the i;i;i;; rrght. i;;;';;'i" "f ton t-o effectiv-9ly u-se his pho-ne' The telephone as a fo?""iig"aot ,rno toow" I'tapped'r will be diq:usse-d in that sectlon technical penetration ..t-rroJ ii", .elc'] of a useful tool' not a bug'. ts that ai"tio"fioo i"-t"te irlre ;]i;;l;"[--it"

,

PIJII{TEDINFORI{ATION

plant infornation For the nonent' we will not consider why one night w-alrt to.it to say' lt is not S-uffi"i property' irrto a-iarget-t" iirl", or on his person or in which an r"t"'" p1anr,'ir nay be rhe only_nethod wheEher the activities.. "u"i1'"*ii;;""ib;i" ""ii mlght gain infornation on a targettr hts invesElgator purelv instead' ",*tor! rt is' essentiarri irrelevant' ;; #;;;i; ;i; ff;;; i.r, f1ow. i catalyst Eo informatlon 1IIE

flfiT

Pursuitofatarget,byaninvestlgator.isoftencalledlrthehunt.llMuchlike snoop hunts a target with as stalks a wildllfe p;; ; *," ,"'"it of truth, thethe objectlve' much stealth and cunnini, using weapons aPProPriate Eo one

A

FEW

IJGITIMATE NEEDS FOR SENSITIVE INFORHATION SCAMUITIG DERIORS

There are books on the narket, which advise regarding s.uch issues as beatlng

establlshing ciedit' gJ,ll'"-'-",:l:'TLtl#" uirrI"Ji"iiot" fl u"a.r""ti,etv ---;lth-:o"t A" ieiepho"e n-unber. "No-5rltsjl ;ilrir':;;:;i"i-'e''"'i i-v i-1,6u3:?2': ""t^f coning' second the H;;';i;; ;:Hi'"t* "uoitin":"1v-tlilq--but their tracks! crlditors dead stop".op befinit"l-y, they yow to"."

A

Ref 34;

u

Ref 35 PUBLISIIED BY EDEN PRESS

4

ffiRBTTGEII

.

FIIB BTf,IXIIPITY

I'that lf your cllent ls an hmest busfuressean who extended credit for whatever reason to soneone now dlaling l{0 BIIJ.S? Is he eatitled to that nhich is ored, or is it fair that he take a pennles o! the dol1ar settlesent? Suppose his N0 BILLS custoner stashed a warchest eod theo started through a public bankruptcy just to fleece your c1lent and others iD h;e positioo? How wl11 you know lf this ia probable? Donrt depend upon the federaL fraud statutes protectlng you. There are so Eany bankruptcies being filed that the coort syaten canrt handle the c6ses, let alone detatled Lnve:stigations of every petltloflerrs statenents. In the adversarlal sense, a courtrs 6n1y hope ts that s,oEeone wlth infornation about concealed assets ril1 eurface at a credlEorsr

hearlng.

That, ls precisely the investigatorrs role in such a situation. If your cllentrg stake is worthrhile, he ril1 hire you to penetrate a fake bankruptcy br a scauning debtorts Eaneuvers.

CIMGD

PARTTERS

Suppose lhat your client has a business parEner yho is suspected to have his hands in the ti1l. unless he catr preaenE sore fairly substantial eyidence, he nonrt get Euch cooperatlon fron the authorities. Again, the skilled i.nyestigator comes into focus as the probable source of protectiooI{$SITG PK)PMTY Perhaps something of conslderable value is nissing from your clienErs hone. He has suspicions, but no proof. AgaLn, rhoo does he turn Eo? Certainly noE the police -- they canrt [or wonrt] help him. The nissing property, incidentally, just olght be the sort of thing he rea11y doesntt. want publicity or Ehe pollce involved with anyway. A private investigator is the an$rer. DMRCE Acf

or

Marital problems? This is a Een chapter subjecE ln itself. I{hether your c1lent wants |tproofrr of hls materg activitles in order to protect his side of Ehe settle[ent, or he walts to track down rrnissingtr jewels, stashed cash, or other hidden assets, he wontt get Euch assiatance fron the police. A private investigaEor ls Ehe logical path. ET CETERA

And so lt goes. Traclng debt or bond ekippere, catching unfalthful business or marriage partne-rs in Ehe act,, or for hundreds of other reaaons --- enlisting the assistance of a (Secret Agenttr nay be your cllentts only recourse. OR TABLES flJRNED

Fron a defensive poature, ore is beEter prepared if it is understood that an enemy, by any definlEion, will use any nethod at his Ior her] connand to create a high payoff target. Many lnvestlgators are oot concerned wlth such trivial naEters as legality, especially 1aw enforcenent agencies. For that Eatter, so nany loopholes exist in federal wlrerap lars at presetrt that one should conslder Ehai PTIBLISHED BY EDEN PRESS

5

SECRET AGEI{T

there are none which truly provide protecti.on. I,lhile this is, by the letter of the law, incorrect, it is an abJolute functional realir-y.

e/

Z/

SBgrIOt

III:

IxE Irrr

AXD

Erg

OilIC

S

v

congress has nade a Eost startLing new publication available !o the . -The u.s. Anerican Public Ehrough its 0ffice of Technology-lssegirmenL--n"i"u""a'in october of

rrElectronic Survelllance and _rvu)' tnls partlcular report ls entlELed Civil Llbertiesrr and 1s available through Eden press. !/

This partlcular reference is probably the nost conclge eource of informatlon regardllrg electronlc surveilLance for tvo ieasons. Flrst, it i"-r"-oirl"i..1 to the llouse comittee on the Jtdiclary and to lhe senate'corrritee o, Governrepori Affalr-s. second, it treata a1_1 legisiatlon from the Fourth Anendnent throughental Ehe very lateat court decislons. Ilereii lies its value in thai r" .ir una.."tand that neans precisely vhar rhe courts say ir does. Thr;, ;;1;e rhe latesr !l:,"1.y" word. orl].cl.aJ.

rests nith the 0TA Electronic Surveillance and Civil Llbertles -- - Authorslip Tven-ty-four .peop-le ranging_ from 1one1y Morron tt.- ttaiperin, eClU'" H::I^"j-"_r._ - one extre.e' to ur.recEor at eleven near-cabinet revei Iaw enforcenent'and judtciary professionals at the other populate this panel. 1ega1 consideratlons. - The reportrs footlngs_ are set in prevailing -Fundanentally, it is crltlial ro recognize ir,.r -tr,"-Gi;.fi-".;;;.;ry framework and ju-d-icla1 i nterpre Eat lons. thereof do not adequately .ir". o", electronic

For.example_, a U.S.' Circuit Court-5uage ft."r"il11t"-"_ {' luongress "-?!1i:".i"I*:'.9/ strourd undertakel amending Title III [0mnibus Crtne Co]ntrol "orrenred and Safe sEreets Act of 1968] to bring Lelevlei"on surveillance rrtrrio it" ... -]Ef - -- iudses are not authorlzed to amend staEutes even to brlng Ehed up to aaie.ir ""loe

Construal of the Omnibus Crime Control and Safe Streets Act, and in particular, Title III whlch pertains to electronic surveil lance has Ied t,o some landmark decislons- Iot example, ttTitle IIf tt as it is popularly ca11ed, is held t,o apply only to sinple telephone Eaps and concealed microphones (bugs;.,,-'

This, in effect' makes surveillance of cellu1ar and nicrowave telephone conversatione' cordless_telephones, electronic nai1, conput., iiot", rsol, ana activlties recorded by T.v, lnfra-red vlewers, e_tc a i'atter totally unregulated by Title III. Thus, it is rlegalrt to conduct fo.r" of survelllance withouE court -e"r"i"r""i orderg i.f one lgnorea the c6onunicarions Act "u.i 19t: a".

"i "g*a" court orders under purview of rrtle rrr are rrrequiredtr only for simple tel.e-phone taps Ile: wire iaps and not radio intercept of ce11u1ar, microwave, or E-r:Tglsionsl and-ioncealed microphones. Ctn"".rJri".o-plJnu" ,o., opon :::d1"^".,"_ Ene 000y are not covered by this law. The elenent of enteri-ng premises a and z/ Ref 28, pp 32, LA-/ Ref 28r pp 3; LL/ Ref 28 L2/ Ref 28r pp 3; L3/ Ref 28, pp 3 PTTBLISIIED BY EDEN PRESS

U

SECRST AcEdT

lnplanting a concealed ulcrophone ls oecessary io order Ehat court orders are ttrequlred. tt {elephon-e converaations alnost always up on nl,crowave relay sooewhere. - FBr doesnrt need a court order per[ittingrinrt The theo Eo intercepE and iecord your telepho[e conversatlons which are on nicrowave tespite the fact international trlaty clauseg and federal conmunlcations 1aw otherrlse nake lt i11ega1 and punishable by stiff finee and prison aen'ences for prlvate operaElves to do io. All the FBr needs ls a llttle rcooperatlontt fron Ma Be11.

. There are eignificant laws on the books regarding the general Lesue and the speclfic natter of electronic surveillaice. ihey iiclude:

of prlvacy

coMMumctTrorls AcT 0F 1934

The conmunications Act of 1934, Section 605: provides, in part, that ,No Peraon not belag authorized .!y tfre sender shal1 inteicept any communication and dlvulge ... the contents ...1' This ran pu:s Driyate opirative at odd,s, but not Sovern0ent agents, as ve shal1 see on page 13 of this book.

several points eEerge. A reyiev of (ahnis 'The co