top of page

Espionage for Authors Pt. 3

  • Writer: John Jeffries
    John Jeffries
  • Nov 14, 2015
  • 1 min read

CAVEAT: These articles are for fiction writing purposes only, and is not to be used for any unlawful purposes.

This series of indeterminate length will focus on unclassified aspects of espionage that can be incorporated into novels. It is based on actual training provided in the security industry, and will help make your characters and settings believable. Not an exhaustive listing, there are many other tactics that can be employed.

Part Three - Why Conduct Surveillance?

Before a surveillance can be authorized, a decision must be made as to whether to conduct one in the first place. Properly done these activities are time-consuming and costly in terms of manpower and equipment. This is true even for the old-fashioned "ABCD" surveillance format (which is used normally only by financially or personnel strapped organizations).

Here are the key justifications:

(1) To learn identities of suspects, supporters, co-conspirators, etc.

(2) To locate dead-drops where information is being placed for transfer

(3) To locate face-to-face meeting sites

(4) To identify lockers, post office boxes, etc. that may be in use by suspects

(5) To further develop leads or information from new sources

(6) To establish background information for undercover / covert operations

(7) To prevent the commission of an unlawful act

(8) To apprehend the subject during the commission of an unlawful act

(9) To establish probable cause for a search warrant request

(10) To check the reliability of informants

Part Four - Planning a Surveillance Operation

Commentaires


Featured Posts
Recent Posts
Search By Tags
Follow Us
  • Facebook Classic
  • Twitter Classic
  • Google Classic

FOLLOW ME

  • LinkedIn Social Icon

© 2023 by Samanta Jonse. Proudly created with Wix.com

bottom of page