Advanced Criminal Investigations and Intelligence Operations

Home > Nonfiction > Advanced Criminal Investigations and Intelligence Operations > Page 1
Advanced Criminal Investigations and Intelligence Operations Page 1

by Unknown




  FORENSICS AND CRIMINAL JUSTICE

  Girod

  Adva

  A

  nce

  dva

  d

  Adva

  A

  nce

  dva

  d Criminal In

  l I v

  n es

  v tiga

  es

  ti

  tiga on

  o s

  n

  and I

  a

  n

  nd I t

  n e

  t l

  e lige

  lig nce O

  e

  per

  e ati

  a on

  o s

  n

  Criminal In

  l I v

  n es

  v tiga

  es

  ti

  tiga on

  o s

  n

  Tradecraft Methods, Practices, Tactics, and Techniques

  and

  a

  Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is A

  In

  I t

  n e

  t l

  e lige

  lig nce O

  e

  per

  e ati

  a on

  o s

  n

  a covert agent for the government or an identity thief and con man, the methods, practices, dva

  tactics, and techniques are often the same and sometimes learned from the same sources.

  a

  reveals how intelligence officers and investigators conduct their tradecraft. You’ll learn how to nd I nce

  Tradecraft Methods,

  plan an operation, how to build an identity and cover story for deep cover operations, and how to detect those who have created false identities for illegal purposes. You’ll also get insight into Practices, Tactics, and Techniques

  the technical aspects of intelligence (the INTs), counterintelligence, and criminal investigations, n d C

  and legal considerations for conducting intelligence investigations.

  tel

  Topics include

  lig rimina

  • A discussion of black bag operational planning

  e

  • HUMINT (human intelligence)—the gathering of information from human sources nce O

  • DAME (defenses against methods of entry), forced entry into buildings, l I

  safes and combination locks, and automobile locks

  • PSYOPS (psychological operations) and the use of social networks

  p n

  e v

  • ELINT (electronic intelligence) and SIGINT (signals intelligence)—electronic interception r es

  of intelligence, bugs, wiretaps, and other communications interceptions

  ati tiga

  • EMINT (emanations intelligence), which concerns the emanation of data, signals, o

  or other intelligence from C4I systems

  n ti

  • IMINT (imagery intelligence), involving any intelligence gathered using images s o

  • Intelligence files and analytical methods

  ns

  Based upon the author’s training and experience over more than three decades as a law enforcement investigator and military officer, as well as research conducted as an attorney and in academia, the book provides you with an insider perspective on sensitive covert and overt operations and sources. Supplemented with roughly 140 il ustrations and photos, this collection of special skil s and reference materials is essential to the professional investigator and intelligence operative.

  K22681

  Dr Robert J. Girod, JD, PhD

  6000 Broken Sound Parkway, NW

  Suite 300, Boca Raton, FL 33487

  711 Third Avenue

  New York, NY 10017

  an informa business

  2 Park Square, Milton Park

  w w w . c r c p r e s s . c o m

  Abingdon, Oxon OX14 4RN, UK

  w w w . c r c p r e s s . c o m

  Advanced

  Criminal Investigations

  and

  Intelligence Operations

  Tradecraft Methods,

  Practices, Tactics, and Techniques

  Advanced

  Criminal Investigations

  and

  Intelligence Operations

  Tradecraft Methods,

  Practices, Tactics, and Techniques

  Dr. Robert J. Girod, JD, PhD

  Robert J. Girod Consulting, LLC

  Fort Wayne, Indiana, USA

  Boca Raton London New York

  CRC Press is an imprint of the

  Taylor & Francis Group, an informa business

  CRC Press

  Taylor & Francis Group

  6000 Broken Sound Parkway NW, Suite 300

  Boca Raton, FL 33487-2742

  © 2014 by Taylor & Francis Group, LLC

  CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works

  Version Date: 20140508

  International Standard Book Number-13: 978-1-4822-3074-1 (eBook - PDF)

  This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

  Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers.

  For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222

  Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

  Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

  Visit the Taylor & Francis Web site at

  http://www.taylorandfrancis.com

  and the CRC Press Web site at

  http://www.crcpress.com

  Contents

  Preface xiii

  Introduction

  xv

  Author xix

  About Robert J. Girod Consulting, LLC

  xxi

  1 Black Bag Operational Planning

  1

  Operational Planning

  1

  Identification and New Identity: Cover Story

  2

  Point of Entry and Exit; Ingress and Egress

  6

  Equipment 7

  Biometric Security Devices

  8

  P
ostoperational Actions and Debrief

  9

  Order of Battle

  10

  Communications in Unconventional Environments

  11

  2 Human Intelligence

  17

  Human Intelligence Operations

  17

  Human Sources: Interviewing and Interrogation

  19

  Security Clearances

  20

  U.S. Intelligence Community

  23

  British Security Service MI5 and Secret Intelligence

  Service MI6 24

  Linguistic Skills (Languages)

  25

  Number of Countries with the Same Official Language

  26

  Learning Languages Fast

  26

  Expanding Your Vocabulary: Useful Words

  34

  Danger Words

  34

  3 HUMINT Surveillance and Undercover Operations 37

  Surveillance and Undercover Operations

  37

  Disguise 38

  Vehicle Disguise

  40

  Physical Disguise

  41

  v

  vi

  Contents

  Long-Term Disguise

  41

  Permanent Disguises

  41

  Identity Theft: Protection and Exploitation

  42

  Birth Certificates

  42

  Social Security Numbers and Cards

  43

  Driver’s Licenses

  45

  Military ID and Ancillary Documents

  45

  Fingerprints 47

  New Passports

  47

  Document Security Devices

  48

  Mail, Mail Drops, and Remailing Services

  48

  Storage Facilities and Real Estate Trusts

  49

  Utilities, Pay-as-You-Go Phones, and Answering Services

  49

  Internet and Internet Privacy

  50

  E-Mail Privacy

  51

  Education and Employment (EIN and TIN) and Doing

  Business 52

  Traveler’s Checks, Money Orders, and Prepaid Credit Cards

  53

  Credit Cards and Credit Bureaus

  54

  Banking Privacy and Offshore Money

  54

  Court-Ordered (Legal) Name Change

  57

  Appendix: Indiana Name Change Statute (IC 34-28-2,

  Chapter 2, “Change of Name”)

  58

  IC 34-28-2-1 Petition to Circuit Court

  58

  IC 34-28-2-1.5 Incarcerated Persons May Not Petition for

  Change of Name

  58

  IC 34-28-2-2 Filing Petition; Procedure for Change of

  Name of Minor

  58

  IC 34-28-2-2.5 Contents of Petition

  59

  IC 34-28-2-3 Notice of Petition

  60

  IC 34-28-2-4 Proof of Publication; Time of Hearing; Notice

  Requirements; Determination on Petition

  61

  IC 34-28-2-5 Court Decree as Evidence; Copy Sent to

  Health Department, Clerk of Circuit Court, or Board

  62

  4 Defenses against Methods of Entry

  63

  Basic Lock Picking

  64

  Practice Preparation

  64

  Lock Pick Practice

  68

  Pin Cylinder Lock

  69

  Warded Pad Locks

  70

  Disc Tumbler Locks

  70

  Contents

  vii

  Pick Guns and Snap Picks

  72

  Schlage Disc™ Tumbler Lock

  73

  5 Forced Entry into Buildings

  79

  Door Jimmy

  79

  Door Shimming

  79

  Cylinder Drill

  81

  Cylinder Wrench

  81

  Window Entry

  81

  Office Equipment and Furniture

  82

  Impressioning 85

  Lock Bumping

  87

  Garage Door Openers: High-Tech Burglary

  90

  How to Change the Frequency for a Garage Door Opener

  (Instructions) 91

  Genie Openers

  91

  Chamberlaim, Sears, or LifeMaster Openers

  91

  Levels of Security

  92

  6 Safes, Combinations, and Automobile Locks

  93

  Forced Entry

  93

  Manipulation 94

  Combination Dial Lock

  98

  Safes and Vaults

  100

  Changing the Combination of a Dial Combination Lock

  102

  Locking System for Automobiles

  105

  Key Codes

  106

  Ignition Locking Systems

  106

  Doors and Trunks

  107

  Pin Tumbler Locks for Autos

  108

  Side-Bar Locks for Autos

  108

  Wafer Tumbler Locks for Autos

  110

  Hacking Car Keyless Entry Systems

  110

  7 Psychological Operations and Social Networks 111

  Psychological Operations

  111

  Military PYSOPs: Psychological Warfare

  113

  Propaganda and Counterpropaganda

  114

  Political PYSOPs

  115

  Techniques of Harassment and Revenge: The Dirty Tricks

  Department 115

  viii

  Contents

  Dirty Tricks: Nasty Pranks

  117

  Utilities and Life’s Little (Planned) Inconveniences

  117

  Let Your Fingers Do the Walking: Yellow Pages and

  Telephones 118

  Car Tricks

  119

  The Pervert Next Door

  119

  Mail Misery

  119

  Ads, Handbills, and Circulars

  121

  Composite Photography, Audio–Video Recordings, and Plants 121

  Internal Disruption: The Coin-Tel-Pro Technique

  123

  Be Aware of the Implications

  124

  Social Media

  124

  Privacy and Security

  125

  8 Electronic Intelligence and Signals Intelligence:

  Bugs and Taps

  127

  Bugs and Electronic Surveillance

  127

  DTMF and ANI Decoders

  127

  Pirate and Underground Radio

  129

  Laser Surveillance Laser Listening

  130

  Telephone Taps

  132

  Internet Phone Services

  133

  Packet Sniffing on the VOIP Data

  136

  Packet Sniffers: Carnivore and Magic Lantern

  138

  Field Expedient Radios

  139

  4G Broadband Public Safety Communications

  141

  Band 14: 700 MHz Public Safety Band

  142

  Routers 142

  Routers and Wi-Fi: How to Access Router Settings

  144

  Using Wi-Fi Technology

  146

  Using Bluetooth Technology

  150

  9 Emanations Intelligence

  153

  Emanations Intelligence

  153

  Measurement and Signature Intelligencer />
  154

  Things That Are Vulnerable to Hacking

  155

  Computer Anonymity, Privacy, and Security

  155

  Cell Phone Baseband Hacking

  157

  Cell Phone Data Retrieval

  158

  IMSI Catchers and Cell-Site Simulators: The StingRay

  159

  Geotagging 160

  Contents

  ix

  Barcode Scanners and Magnetic Stripe Reader/Programmer

  163

  Magstripe Forgery and Skimming

  165

  RFID 167

  Other Frequencies

  167

  Remote Electromagnetic Sensors

  168

  Explosives Trace Detectors (Vapor Detectors)

  171

  10 Imagery Intelligence

  173

  Night Vision Devices

  173

  Satellite Imagery

  178

  Mapping and Geographical Data

  179

  Processing and Consuming Imagery Intelligence

  181

  Surveillance Target Acquisition and Night Observation

  182

  Pinhole Cameras

  182

  Biometrics 183

  License Plate Readers

  184

  11 Internet and Database Open Sources

  185

  Open-Source Intelligence

  185

  Intelligence Research Sources

  185

  Database Sources of Information

  186

  Fact Checking Intellectual Property and Plagiarism

  186

  Social Security Numbers and Vital Records

  187

  Driver’s License and License Plate Information

  188

  Criminal History Checks and Court Records

  188

  Tracking Sources and Stolen Property

  189

  Consumer Protection

  190

  Credit Records

  190

  Military and Genealogical Sources

  191

  Sources of Telephone Information: Names, Addresses,

  and Phone Numbers

  191

  Internet Address Information

  192

  Maps, Aerial and Satellite Photos, and Weather

  192

  Professional Licenses

  193

  Education and Degree Checks

  193

  Social Networks

  194

  Background Investigations Online

  194

  Competitive Intelligence

  194

  Internet Intelligence and Spyware

  195

  Net Spying and Web Surveillance

  198

  x

  Contents

  12 Intelligence Files and Analytical Investigative

  Methods 199

  Intelligence Cycle

  199

  Planning and Direction

  199

  Collection 199

  Processing 200

  Analysis 201

  Dissemination and Feedback

  202

  Intelligence Files

  204

  Intelligence Analysis

  205

  Analytical Investigative Methods

  205

  Visual Investigative Analysis

  206

  Financial Information

  212

 

‹ Prev