Biographic leverage

Last updated

Biographic leverage is a term used in the field of espionage to describe a form of blackmail in which a piece of negative information about an individual is used as leverage to persuade them to do something they are reluctant to do or to disclose secret information. [1] [2] This information could be about events in the individual's past, or their current personal life. Details of criminal activities or marital infidelity are common forms of biographic leverage; recruitment as a spy is a frequent goal of such activity. For example, the fact that William G. Sebold had been prosecuted for petty theft was used as biographic leverage by Abwehr to persuade him to be involved in undercover intelligence work in the 1940s. [3]

An attempt to gain leverage material on a heterosexual male target through entrapment of a sexual nature by a female operative is called a honeytrap , honeypot, or swallow; an attempt to gain leverage material on a homosexual male target through entrapment of a sexual nature by a male operative is called a raven. [4] Attempts of this nature are so frequent and routine and taken so unseriously by the experienced HUMINT operator that the target is often better off reporting the leverage attempt to their handler/operator and letting the experienced professional deal with the attack than submit to the coercive force.

Related Research Articles

Espionage or spying is the act of obtaining secret or confidential information from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangible benefit. A person who commits espionage is called an espionage agent or spy. Any individual or spy ring, in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law.

Industrial espionage Use of espionage for commercial purposes rather than security

Industrial espionage, economic espionage, corporate spying or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.

Cold War espionage

Cold War espionage describes the intelligence gathering activities during the Cold War between the Western allies and the Eastern Bloc. Both relied on a wide variety of military and civilian agencies in this pursuit.

Robert Hanssen FBI agent who spied for the USSR and Russia

Robert Philip Hanssen is an American former Federal Bureau of Investigation (FBI) double agent who spied for Soviet and Russian intelligence services against the United States from 1976 to 2001. His espionage was described by the Department of Justice as "possibly the worst intelligence disaster in U.S. history." Hanssen is currently serving 15 consecutive life sentences without parole at ADX Florence, a federal supermax prison near Florence, Colorado.

Counterintelligence Offensive measures using enemy information

Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

In espionage jargon, a mole is a long-term spy who is recruited before having access to secret intelligence, subsequently managing to get into the target organization. However, it is popularly used to mean any long-term clandestine spy or informant within an organization, government or private. In police work, a mole is an undercover law-enforcement agent who joins an organization in order to collect incriminating evidence about its operations and to eventually charge its members.

Intelligence assessment is the development of behavior forecasts or recommended courses of action to the leadership of an organisation, based on wide ranges of available overt and covert information. Assessments develop in response to leadership declaration requirements to inform decision making. Assessment may be executed on behalf of a state, military or commercial organisation with ranges of information sources available to each.

A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals using a secret location. By avoiding direct meetings, individuals can maintain operational security. This method stands in contrast to the live drop, so-called because two persons meet to exchange items or information.

Tradecraft Espionage techniques

Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern espionage (spying) and generally, as part of the activity of intelligence assessment. This includes general topics or techniques, or the specific techniques of a nation or organization.

Geoffrey Arthur Prime is a British former spy, who disclosed information to the Soviet Union while working for the Royal Air Force and later for Government Communications Headquarters (GCHQ), a British intelligence agency, responsible for signals intelligence, during the 1960s and '70s. Prime was convicted in the early 1980s of charges of espionage and child sexual abuse, and released from prison in the 2000s.

Operation Elster

Operation Elster was a German espionage mission intended to gather intelligence on U.S. military and technology facilities during World War II. The mission commenced in September 1944 with two Nazi agents sailing from Kiel, Germany on the U-1230 and coming ashore in Maine on November 29, 1944. The agents were William Colepaugh, an American-born defector to Germany, and Erich Gimpel, an experienced German intelligence operative. They spent nearly a month living in New York City, expending large amounts of cash on entertainment, but accomplishing none of their mission goals.

Clandestine human intelligence is intelligence collected from human sources using clandestine espionage methods. These sources consist of people working in a variety of roles within the intelligence community. Examples include the quintessential spy, who collects intelligence; couriers and related personnel, who handle an intelligence organization's (ideally) secure communications; and support personnel, such as access agents, who may arrange the contact between the potential spy and the case officer who recruits them. The recruiter and supervising agent may not necessarily be the same individual. Large espionage networks may be composed of multiple levels of spies, support personnel, and supervisors. Espionage networks are typically organized as a cell system, in which each clandestine operator knows only the people in his own cell, perhaps the external case officer, and an emergency method to contact higher levels if the case officer or cell leader is captured, but has no knowledge of people in other cells. This cellular organization is a form of compartmentalisation, which is an important tactic for controlling access to information, used in order to diminish the risk of discovery of the network or the release of sensitive information.

Clandestine HUMINT asset recruiting refers to the recruitment of human agents, commonly known as spies, who work for a foreign government, or within a host country's government or other target of intelligence interest for the gathering of human intelligence. The work of detecting and "doubling" spies who betray their oaths to work on behalf of a foreign intelligence agency is an important part of counterintelligence.

For real-world examples, see Recruitment of spies.

The American media referred to 1985 as the Year of the Spy because law enforcement arrested many foreign spies operating on American soil. However, the preceding year, 1984, actually had more arrests for espionage in the United States.

Technical Intelligence (TECHINT) is intelligence about weapons and equipment used by the armed forces of foreign nations. The related term, scientific and technical intelligence, addresses information collected or analyzed about the broad range of foreign science, technology, and weapon systems.

In Russian culture, kompromat, short for "compromising material", is damaging information about a politician, a businessperson, or other public figure, which may be used to create negative publicity, as well as for blackmail, often to exert influence rather than monetary gain, and extortion. Kompromat may be acquired from various security services, or outright forged, and then publicized by use of a public relations official. Widespread use of kompromat has been one of the characteristic features of the politics of Russia and other post-Soviet states.

Advanced persistent threat Set of stealthy and continuous computer hacking processes

An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals.

Chinese espionage in the United States

The United States has often accused the government of the People's Republic of China of attempting to unlawfully acquire U.S. military technology and classified information as well as trade secrets of U.S. companies in order to support China's long-term military and commercial development. Chinese government agencies and affiliated personnel have been accused of using a number of methods to obtain U.S. technology, including espionage, exploitation of commercial entities, and a network of scientific, academic and business contacts. Espionage cases include Larry Wu-Tai Chin, Katrina Leung, Gwo-Bao Min, Chi Mak and Peter Lee.

Sexpionage is the involvement of sexual activity, or the possibility of sexual activity, intimacy, romance, or seduction to conduct espionage. Sex or the possibility of sex can function as a distraction, incentive, cover story, or unintended part of any intelligence operation. Sexpionage is a historically documented phenomenon and even the CIA has previously added Nigel West's work Historical Dictionary of Sexspionage to its proposed intelligence officer's bookshelf. Female agents using such tactics are known as sparrows, while male ones are known as ravens.

References

  1. Smith, W. Thomas (2003). Encyclopedia of the Central Intelligence Agency . Infobase Publishing. p. 29.
  2. Green, Jonathon (1984). Newspeak: A Dictionary of Jargon. Routledge. p. 23.
  3. Johnson, David Alan (2007). Betrayal: The True Story of J. Edgar Hoover and the Nazi Saboteurs Captured During WWII. Hippocrene Books. pp. 30–31.
  4. Palmer, Norman; Allen, Thomas B. (1996). Spy Book: The Encyclopedia of Espionage. Random House Reference.