Spotting counterintelligence threats in your group

When the Ammon Bundy-led Malheur standoff ended in 2016, it was discovered that at any given time, the FBI was receiving information from as many as 15 informants through direct contacts with the Malheur occupiers. The group had been heavily infiltrated by informants and agents, many of whom were given authorization to commit felonies while functioning as occupiers. At least one of the informants has said he was intimidated to join the group and provide information to the FBI. In this example, we see two types of infiltrators, those being the provocateur and the probe.

A provocateur is someone who is in place to entice people in a group to take certain actions that would be detrimental to their cause, or otherwise beneficial to and outside and competing cause. In this case, the provocateurs were aiming for criminal actions.

A probe is in place more as a means of collecting information and passing it to an outside handler. Also called a mole, these people can work their way into the higher levels of a large group and gain access to deeper information.

There is nothing stopping someone from occupying the roles of provocateur and probe at the same time. In fact, this is quite common. In my opinion, we saw at least one example of this in the Ruby Ridge events that took place in the early 1990’s leading to the 11 day August 1992 standoff. The ATF had multiple federal agents embedded inside the Aryan Nations (AN), and some have claimed with credibility that the regional leadership itself was primarily run by the ATF. If the leadership structure of a nefarious organization is primarily comprised of federal agents, what does that tell you about these nefarious organizations and the federal agencies themselves? In this case it was noted that ATF agents and their informants were actively collecting information on members and non-member contacts of the AN, and attempting to get people to traffic in illegally modified firearms. This was a tactic used against Randy Weaver.

In order to protect a group from infiltration is to learn how to detect the infiltrators. Here are several ways to do this:

1. If someone is routinely pushing the group to conduct illegal and risky activities, this is a red flag. I fully understand that the line between legal and illegal has never been more fluid, thanks to the design of a system meant to allow the law to arrest anyone they see fit at any time for any nebulous violation. However, we still live in a time where we could theoretically win this fight and still easily remain free from criminal conviction. We are not required to break the law today in order to achieve our goals. If someone in your group doesn’t see it that way and is actively advocating for risky, lawbreaking behavior, take a closer look at them.

2. If someone is brand new to your cause and begins making moves throughout the group, bending the ears of the “leaders” or the old timers, rising through the ranks despite not having the requisite experiences to gain the trust of everyone, this is suspicious. With some training, moles can join a group and place themselves among the leadership in quick order. Try to distinguish between a person who seems off and a person who is a go-getter would good ideas and high levels of motivation. It’s a good thing to make moves and make progress, but if someone seems to be moving up the ladder without doing the real legwork, trust your gut.

3. If a person is repeatedly found to be dishonest, they may be a mole. Most of the time when someone is acting as a mole, there is something that they’re not able to be honest about. It could be something regarding their background. It could be something about their family. It might be a lot of things. They could be hiding an entirely separate identity, but it may be just some minor things as well. Often, if a mole finds that embellishing or outright lying will help them achieve their goals, they’ll do it. If they do it enough, it can become habit, and they can be caught. Keep in mind that not everyone who does this once is a counterintelligence threat, but it’s a hard sign.

4. If someone has an unexplained surplus of funds and resources, this needs to be examined deeper. You may not be inclined to pry into someone’s private affairs, but if you can find a way to explain what’s going on, do it. Until then, you may need to compartmentalize that member.

5. If a member of your group is conducting surveillance-like activities, such as recording meetings that don’t need to be recorded, taking photographs of things that would only matter to a source handler, taking notes when it’s not necessary, this is a bad sign. If someone is asking odd questions that contain strange information, like license plate numbers or unusual personally identifying information, look into it. Ask yourself if the information the person is recording, photographing, writing down or asking about would be useful to anyone other than a source handler. If you can’t think of anyone besides that who might care about the information in question, then it’s time to investigate.

6. If someone already has a criminal background, this can be a counterintelligence threat. They’ve already had extensive contact with law enforcement and may be accessible in that way. Not everyone with a record is a bad person or a liability, this is very true. But there does seem to be a high correlation between provocateur activity and possessing a rap sheet.

7. This is an obvious one, but it still sometimes needs to be mentioned. If your group has been discussing some high level information and suddenly the other side ends up with it, then you may have a leak. Observe who has access to the info and limit it as you’re able and as is necessary.

8. If your group has a location where you all meet and spend any significant amount of time, observing a member coming and going at odd times or for unexplained reasons could be a tip that they are bringing materials in and out of the location.

It’s important to be aware and look for counterintelligence threats in your group, but don’t let the possibility of infiltration stop you from connecting with like-minded folks. Just be watchful and trust your instincts!

Spread the love
                

Share This Story, Choose Your Platform!

About the Author: admin

14 Comments

  1. Matt Bracken January 9, 2020 at 08:20

    While we’re on the subject of counterintelligence, and with Richmond looming, I think this is worth a reminder:
    FBI National Press Office / March 8, 2019
    David W. Archey Named Special Agent in Charge of the Richmond Field Office

    FBI Director Christopher Wray has named David W. Archey as special agent in charge of the Richmond Field Office. Mr. Archey most recently served as a deputy assistant director in the Counterintelligence Division at FBI Headquarters and was assigned as the FBI senior lead at the Special Counsel’s Office. /snip/ Mr. Archey returned to the Baltimore Field Office in 2010 as the supervisory special agent for the counterintelligence squad. In 2012, he received the Office of the Director of National Intelligence Award for Excellence in Counterintelligence Operations. In April 2013, Mr. Archey led the Baltimore Field Office’s counterintelligence and cyber divisions as assistant special agent in charge. He was promoted to section chief at FBI Headquarters in September 2014, where he oversaw the Global Section in the Counterintelligence Division. Mr. Archey was then named deputy assistant director of the Weapons of Mass Destruction Directorate in October 2016.

    https://www.americanpartisan.org/2020/01/richmond-the-mother-of-all-buffalo-jumps/

  2. Anonymous January 9, 2020 at 09:46

    4.5

  3. Anonymous January 9, 2020 at 09:59

    5

  4. Steve Shapiro January 9, 2020 at 14:35

    “We are not required to break the law today in order to achieve our goals.”
    I’m not so sure I agree with that statement, but I truly hope you are correct.
    “Just be watchful and trust your instincts!”
    Unless you know from experiencethat your instincts are generally wrong. I know mine usually suck.

  5. Vetmike January 9, 2020 at 15:09

    Good points all. Historically, if a party was rolled up, it was likely that a mole or someone connected to the group provided the information. The classic example is the Maquis of WWII. If your group is in a position to do so, consider a triangular cell structure for the leadership and keep your strike group small and isolated from the leadership. Lots of other things you can do but the key is keeping your group small and knowing everyone in it.

  6. Greg January 10, 2020 at 16:13

    WRT information leaking out, it can help to very selectively leak out false information. Easy way to pin a mole.

  7. Bob January 10, 2020 at 19:50

    I’m starting to like Grey Man’s contributions here. Another good piece by him is here: https://www.americanpartisan.org/2019/08/spotting-and-assessing-human-sources-of-information/

    Now, has anyone broached the subject of our infiltrating Law Enforcement? Having the ability to run license plates or finger prints would be quite a valuable asset. Any ideas on how to acquire such an asset? Would simply getting hired as a police officer be sufficient or would one have to work one’s way up the ladder for a while to get legitimate access to such resources. And are there any opportunities to gain illegitimate access to such resources? How difficult would it be to hack into a system and get access to such material as might benefit our cause?
    Asking for a friend.

  8. Aesop January 11, 2020 at 02:00

    @Greg

    Known in the trade as the Canary Trap, you don’t just leak out false information, you leak out false information so juicy and time sensitive they can’t help acting on it. And you alter the information subtly to each and every suspected leaker, and see which version(s) cross to the other side.

    QED, you have your mole(s).

    Whether you thereafter put the thumbscrews to them, flip them and run them as double agents, kick them out, or put them in a landfill at that point depends largely on the stakes of whatever enterprise one is engaged in.

    In the PIRA, .22s through the kneecaps, and sometimes drill bits, were the rule of thumb in most instances for fellow Irishmen, pour encourager les autres.
    Enemy plants were dealt with rather more severely and permanently.

    People are people. Anyone too good to be true, is.
    If your group (of any number of people higher than one) has nobody doing counterintelligence, you’re penetrated. Period.
    And there are no coincidences.

  9. […]  SPOTTING COUNTERINTELLIGENCE THREATS IN YOUR GROUP Posted by Gray Man | Jan 9, 2020 | Grey Man, Intelligence https://www.americanpartisan.org/2020/01/counterintelligence-threats-in-your-group/ […]

  10. It Has Come To This | 357 Magnum January 11, 2020 at 14:14

    […] Because the Left won’t stop in Virginia. If gun confiscation works there, it will be forced everywhere. Spotting counterintelligence threats in your group. […]

  11. SdKfz251-Wurfrahmen 40 January 13, 2020 at 14:47

    Group is the first mistake. Yes alone is not the answer but the smaller the group the better. I have maybe two people who can be trusted with topics such as the Ticy Spime. Instincts never lie for a reason because it is there for survival. Survival is the high, the rush, the drug, and everything else is irrelevant.

    • Gray Man January 13, 2020 at 18:22

      The two people in your small group, plus you… None of you are married/attached, none of you have children? Your parents be damned?

      The idea that post-SHTF America is going to consist of groups of three or four unattached dudes roaming around and out-surviving everyone else isn’t reality. It wasn’t/isn’t like that in Yugoslavia, Argentina, Venezuela, or any other country where the people have experienced the end of their world as they knew it. The fact of the matter is that for a lot of Americans, surviving in a three-man group is not realistic or even preferable.

      Having a small group of three of four guys who are the “shooters” in the group is fine, but understand that you’re going to be hard pressed to find three or four guys who all have no attachments.

  12. Anonymous January 15, 2020 at 13:52

    4

  13. Tommy kharma February 15, 2020 at 13:54

    Absolutely excellent article. In Bolivia, the spooks infiltrated the DEA and informed the narcos of every op. When discovered, they switched to using U-2’s to monitor DEA ops for the narcos. In Afghanistan, the spooks posed as lawyers to learn of any counter narcotic ops planned, and immediately briefed the Taliban on how to ovoid the ops. Very, very, very good article.

Comments are closed.

GUNS N GEAR

Categories

Archives

Spread the love