by Unknown
FORENSICS AND CRIMINAL JUSTICE
Girod
Adva
A
nce
dva
d
Adva
A
nce
dva
d Criminal In
l I v
n es
v tiga
es
ti
tiga on
o s
n
and I
a
n
nd I t
n e
t l
e lige
lig nce O
e
per
e ati
a on
o s
n
Criminal In
l I v
n es
v tiga
es
ti
tiga on
o s
n
Tradecraft Methods, Practices, Tactics, and Techniques
and
a
Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is A
In
I t
n e
t l
e lige
lig nce O
e
per
e ati
a on
o s
n
a covert agent for the government or an identity thief and con man, the methods, practices, dva
tactics, and techniques are often the same and sometimes learned from the same sources.
a
reveals how intelligence officers and investigators conduct their tradecraft. You’ll learn how to nd I nce
Tradecraft Methods,
plan an operation, how to build an identity and cover story for deep cover operations, and how to detect those who have created false identities for illegal purposes. You’ll also get insight into Practices, Tactics, and Techniques
the technical aspects of intelligence (the INTs), counterintelligence, and criminal investigations, n d C
and legal considerations for conducting intelligence investigations.
tel
Topics include
lig rimina
• A discussion of black bag operational planning
e
• HUMINT (human intelligence)—the gathering of information from human sources nce O
• DAME (defenses against methods of entry), forced entry into buildings, l I
safes and combination locks, and automobile locks
• PSYOPS (psychological operations) and the use of social networks
p n
e v
• ELINT (electronic intelligence) and SIGINT (signals intelligence)—electronic interception r es
of intelligence, bugs, wiretaps, and other communications interceptions
ati tiga
• EMINT (emanations intelligence), which concerns the emanation of data, signals, o
or other intelligence from C4I systems
n ti
• IMINT (imagery intelligence), involving any intelligence gathered using images s o
• Intelligence files and analytical methods
ns
Based upon the author’s training and experience over more than three decades as a law enforcement investigator and military officer, as well as research conducted as an attorney and in academia, the book provides you with an insider perspective on sensitive covert and overt operations and sources. Supplemented with roughly 140 il ustrations and photos, this collection of special skil s and reference materials is essential to the professional investigator and intelligence operative.
K22681
Dr Robert J. Girod, JD, PhD
6000 Broken Sound Parkway, NW
Suite 300, Boca Raton, FL 33487
711 Third Avenue
New York, NY 10017
an informa business
2 Park Square, Milton Park
w w w . c r c p r e s s . c o m
Abingdon, Oxon OX14 4RN, UK
w w w . c r c p r e s s . c o m
Advanced
Criminal Investigations
and
Intelligence Operations
Tradecraft Methods,
Practices, Tactics, and Techniques
Advanced
Criminal Investigations
and
Intelligence Operations
Tradecraft Methods,
Practices, Tactics, and Techniques
Dr. Robert J. Girod, JD, PhD
Robert J. Girod Consulting, LLC
Fort Wayne, Indiana, USA
Boca Raton London New York
CRC Press is an imprint of the
Taylor & Francis Group, an informa business
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2014 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works
Version Date: 20140508
International Standard Book Number-13: 978-1-4822-3074-1 (eBook - PDF)
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Contents
Preface xiii
Introduction
xv
Author xix
About Robert J. Girod Consulting, LLC
xxi
1 Black Bag Operational Planning
1
Operational Planning
1
Identification and New Identity: Cover Story
2
Point of Entry and Exit; Ingress and Egress
6
Equipment 7
Biometric Security Devices
8
P
ostoperational Actions and Debrief
9
Order of Battle
10
Communications in Unconventional Environments
11
2 Human Intelligence
17
Human Intelligence Operations
17
Human Sources: Interviewing and Interrogation
19
Security Clearances
20
U.S. Intelligence Community
23
British Security Service MI5 and Secret Intelligence
Service MI6 24
Linguistic Skills (Languages)
25
Number of Countries with the Same Official Language
26
Learning Languages Fast
26
Expanding Your Vocabulary: Useful Words
34
Danger Words
34
3 HUMINT Surveillance and Undercover Operations 37
Surveillance and Undercover Operations
37
Disguise 38
Vehicle Disguise
40
Physical Disguise
41
v
vi
Contents
Long-Term Disguise
41
Permanent Disguises
41
Identity Theft: Protection and Exploitation
42
Birth Certificates
42
Social Security Numbers and Cards
43
Driver’s Licenses
45
Military ID and Ancillary Documents
45
Fingerprints 47
New Passports
47
Document Security Devices
48
Mail, Mail Drops, and Remailing Services
48
Storage Facilities and Real Estate Trusts
49
Utilities, Pay-as-You-Go Phones, and Answering Services
49
Internet and Internet Privacy
50
E-Mail Privacy
51
Education and Employment (EIN and TIN) and Doing
Business 52
Traveler’s Checks, Money Orders, and Prepaid Credit Cards
53
Credit Cards and Credit Bureaus
54
Banking Privacy and Offshore Money
54
Court-Ordered (Legal) Name Change
57
Appendix: Indiana Name Change Statute (IC 34-28-2,
Chapter 2, “Change of Name”)
58
IC 34-28-2-1 Petition to Circuit Court
58
IC 34-28-2-1.5 Incarcerated Persons May Not Petition for
Change of Name
58
IC 34-28-2-2 Filing Petition; Procedure for Change of
Name of Minor
58
IC 34-28-2-2.5 Contents of Petition
59
IC 34-28-2-3 Notice of Petition
60
IC 34-28-2-4 Proof of Publication; Time of Hearing; Notice
Requirements; Determination on Petition
61
IC 34-28-2-5 Court Decree as Evidence; Copy Sent to
Health Department, Clerk of Circuit Court, or Board
62
4 Defenses against Methods of Entry
63
Basic Lock Picking
64
Practice Preparation
64
Lock Pick Practice
68
Pin Cylinder Lock
69
Warded Pad Locks
70
Disc Tumbler Locks
70
Contents
vii
Pick Guns and Snap Picks
72
Schlage Disc™ Tumbler Lock
73
5 Forced Entry into Buildings
79
Door Jimmy
79
Door Shimming
79
Cylinder Drill
81
Cylinder Wrench
81
Window Entry
81
Office Equipment and Furniture
82
Impressioning 85
Lock Bumping
87
Garage Door Openers: High-Tech Burglary
90
How to Change the Frequency for a Garage Door Opener
(Instructions) 91
Genie Openers
91
Chamberlaim, Sears, or LifeMaster Openers
91
Levels of Security
92
6 Safes, Combinations, and Automobile Locks
93
Forced Entry
93
Manipulation 94
Combination Dial Lock
98
Safes and Vaults
100
Changing the Combination of a Dial Combination Lock
102
Locking System for Automobiles
105
Key Codes
106
Ignition Locking Systems
106
Doors and Trunks
107
Pin Tumbler Locks for Autos
108
Side-Bar Locks for Autos
108
Wafer Tumbler Locks for Autos
110
Hacking Car Keyless Entry Systems
110
7 Psychological Operations and Social Networks 111
Psychological Operations
111
Military PYSOPs: Psychological Warfare
113
Propaganda and Counterpropaganda
114
Political PYSOPs
115
Techniques of Harassment and Revenge: The Dirty Tricks
Department 115
viii
Contents
Dirty Tricks: Nasty Pranks
117
Utilities and Life’s Little (Planned) Inconveniences
117
Let Your Fingers Do the Walking: Yellow Pages and
Telephones 118
Car Tricks
119
The Pervert Next Door
119
Mail Misery
119
Ads, Handbills, and Circulars
121
Composite Photography, Audio–Video Recordings, and Plants 121
Internal Disruption: The Coin-Tel-Pro Technique
123
Be Aware of the Implications
124
Social Media
124
Privacy and Security
125
8 Electronic Intelligence and Signals Intelligence:
Bugs and Taps
127
Bugs and Electronic Surveillance
127
DTMF and ANI Decoders
127
Pirate and Underground Radio
129
Laser Surveillance Laser Listening
130
Telephone Taps
132
Internet Phone Services
133
Packet Sniffing on the VOIP Data
136
Packet Sniffers: Carnivore and Magic Lantern
138
Field Expedient Radios
139
4G Broadband Public Safety Communications
141
Band 14: 700 MHz Public Safety Band
142
Routers 142
Routers and Wi-Fi: How to Access Router Settings
144
Using Wi-Fi Technology
146
Using Bluetooth Technology
150
9 Emanations Intelligence
153
Emanations Intelligence
153
Measurement and Signature Intelligencer />
154
Things That Are Vulnerable to Hacking
155
Computer Anonymity, Privacy, and Security
155
Cell Phone Baseband Hacking
157
Cell Phone Data Retrieval
158
IMSI Catchers and Cell-Site Simulators: The StingRay
159
Geotagging 160
Contents
ix
Barcode Scanners and Magnetic Stripe Reader/Programmer
163
Magstripe Forgery and Skimming
165
RFID 167
Other Frequencies
167
Remote Electromagnetic Sensors
168
Explosives Trace Detectors (Vapor Detectors)
171
10 Imagery Intelligence
173
Night Vision Devices
173
Satellite Imagery
178
Mapping and Geographical Data
179
Processing and Consuming Imagery Intelligence
181
Surveillance Target Acquisition and Night Observation
182
Pinhole Cameras
182
Biometrics 183
License Plate Readers
184
11 Internet and Database Open Sources
185
Open-Source Intelligence
185
Intelligence Research Sources
185
Database Sources of Information
186
Fact Checking Intellectual Property and Plagiarism
186
Social Security Numbers and Vital Records
187
Driver’s License and License Plate Information
188
Criminal History Checks and Court Records
188
Tracking Sources and Stolen Property
189
Consumer Protection
190
Credit Records
190
Military and Genealogical Sources
191
Sources of Telephone Information: Names, Addresses,
and Phone Numbers
191
Internet Address Information
192
Maps, Aerial and Satellite Photos, and Weather
192
Professional Licenses
193
Education and Degree Checks
193
Social Networks
194
Background Investigations Online
194
Competitive Intelligence
194
Internet Intelligence and Spyware
195
Net Spying and Web Surveillance
198
x
Contents
12 Intelligence Files and Analytical Investigative
Methods 199
Intelligence Cycle
199
Planning and Direction
199
Collection 199
Processing 200
Analysis 201
Dissemination and Feedback
202
Intelligence Files
204
Intelligence Analysis
205
Analytical Investigative Methods
205
Visual Investigative Analysis
206
Financial Information
212