Roman Ronin. Your own intelligence
“To know the true state of affairs” means to have the opportunity to act with certainty” – this is the main idea of the author, a professional in secret warfare.
How to collect and analyze the necessary information, how to attract people to cooperate, how to motivate them to do what you need – this and much more related to intelligence work,
is described in the book.
“Your Intelligence” is a valuable guide for security services, detective and security agencies, and in general for anyone who wants to act on the basis of accurate information, not speculation.
CONTENTS
INTRODUCTION
PART 1. METHODS OF OBTAINING AND EVALUATING INFORMATION
1. Introductory Provisions
2. Brief characteristics of information sources
3. Taking information from an individual
— Personal motives for giving out information
— Methods of active invoice extraction
— Informant introduction techniques
4. Taking information from documents
— Gaining access to documents
— Interception and censorship of letters
— Processing “garbage”
5. Taking information from means of communication
— Interception of radio communications
— Removing information from a telephone
6. Obtaining information through tracking
— Surveillance of a stationary object
— Surveillance of an individual
— Covert listening to conversations and negotiations
— Using rumors
7. Principles of assessing and analyzing information
— Reliability and reliability of materials
— Distortion of information and disinformation
— Data interpretation techniques
PART 2. METHODS OF SEARCHING FOR AND RECRUITING INFORMANTS
1. Introductory Provisions
2. Identifying the Candidate
3. Developing the Candidate
— Preliminary Study
— Establishing Contact
— Deepening Contact
— Testing Techniques
4. Compiling a Dossier
5. Candidate Assessment Tactics
6. Recruitment
7. Dealing with the Recruited
— Direction of His Activities
— Retention Methods
— Verification Methods
— Communication Methods
— Closing the Contact
PART 3. METHODS OF ENSURING EFFECTIVE COMMUNICATION
1. Theory and practice of effective communication
— Purposeful design
— General recommendations for organization
— Psychophysiological aspects
— Components of communication
2. Accuracy of perception of the communication partner
— Introductory provisions
— Facial expressions
— Glance and eyes
— Posture and its details
— Gestures and body movements
— Voice intonations
— Vocabulary features
— Involuntary reactions
— Background mood
— Micro-fluctuations in mood
3. Neurolinguistic penetration into the psyche
— Introductory provisions
— Recognition of the method of information processing
— Calibration of the communication partner
— Manipulation technique using NLP
PART 4. METHODS OF TARGET-DIRECTED INFLUENCE ON A HUMAN
1. Introductory Provisions
2. Methods of Influence
— Persuasion
— Suggestion
— Hypnosis
— Drug Influence
— Sex Activities
— Technotronic Methods
— Zombification
3. Bribery
4. Blackmail with Compromising Evidence
5. Intimidation
6. Torture
PART 5. ENSURING THE SECURITY OF INTELLIGENCE WORK
1. Introductory Provisions
2. Elements of the Security System
— External security
— Internal Security
— Local Security
— Organizing Meetings
— «Going Under»
3. Ensuring the Secrecy of Messages
— Cryptography
— Encryption
— Decryption
— Steganography
APPENDIX 1. SPECIAL EQUIPMENT DIAGRAMS
APPENDIX 2. SEARCH AND DISARMING EXPLOSIVE DEVICES
— Types of Explosive Devices
— Sequence of Defusing Explosive Devices
— Methods for Detecting Explosive Devices
APPENDIX 3. BUSINESSMAN SECURITY PROBLEMS
1. Does a businessman need a gun?
2. What should a bodyguard be like
3. A dog is a businessman's best friend
4. General measures of protection against assassination attempts
5. Protecting a car and apartment
6. How to behave during a kidnapping
7. Protection from technical means of espionage
8. Creating your own security service
RECOMMENDED REFERENCES