is due to the knowledge they possess of military operations.
does not stop here. We are in an age of advanced technology and scientific
Much of it is geared toward national defense.
industrial facilities and defense depots rank high as targets for espionage.
b. Gathering intelligence data is much like working a puzzle. Shrewd,
expertly trained agents collect fragments of data from varied sources. Once
assembled, these pieces present a broad enough picture for the enemy. They
can then make fairly accurate assumptions about operations.
They can piece
together technical development or military readiness. The goal of espionage
is to have a military edge in case of war. Espionage is a valuable tool in
reaching this goal.
Methods of Espionage. Trench coat and dark glasses are not typical of
today's espionage agents.
They may disguise themselves as legitimate
businessmen. They may assume disguises of tradesmen such as electricians or
plumbers. They may pretend to be college students or professors. They may
be coworkers, neighbors, or social acquaintances.
Be assured that some
agents obtain considerable rank.
This may occur in military as well as
civilian government and industrial positions.
To avoid espionage, security
personnel must have a sharp knowledge of how information is gathered. It is
vital that you learn how the enemy thinks, since great ingenuity is used by
agents in getting information. Some of the methods employed are as follows:
a. Stealing or buying information from employees.
financial crisis are victimized by agents.
They offer financial aid for
b. Stealing information from records. Agents may actually be employees
at a post. They may seize chances to steal valuable records.
c. Using threats of danger to relatives or friends of an employee to
d. Using blackmail techniques by threatening to expose intimate and
personal information about a person.
e. Securing information from waste and carbon paper and other discarded
g. Using "fronts," such as commercial concerns or import-export
businesses. Travel agencies and scientific organizations are other examples.
Agents use these fronts to obtain information.
Security personnel should be knowledgeable of
specific subjects which may interest espionage agents.
This would include
any specific data which adds to an evaluation of the nation's war potential.
Specific areas of interest include the following: