![]() ![]() The security loophole that Hezbollah plans to exploit to walk catastrophic biological agents out of a scientist’s deep freezer. The name of a seller on his way to provide Soviet-era tactical nukes to a contact in al-Qaeda. The location of a detainee, delivered hours before she’s to be beheaded. I know from my time at the Agency’s Counterterrorism Center how precious that information can be. The aim is the much-coveted “second meeting”: an opportunity to continue the conversation somewhere else at some later date this offers the operative the chance to build a relationship and, with it, access to whatever information the target might hold. We’re given our first operational assessment: a bump, which means finding a target of interest in some public place and manufacturing a reason to get him or her talking. My small band of classmates and I run around DC at all hours of the day and night, marking signal sites with chalk and identifying the license plates of cars that trail us, sorting the training surveillants from the real ones, high on the fact that the civilians around us are carrying on with their normal days, oblivious to what’s happening right in front of them. ![]() I start the CIA Field Tradecraft course in the fall of 2005, learning the basics of elicitation, dead drops, bumps, brush passes, and surveillance detection. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |