{"id":13870,"date":"2023-03-21T02:34:26","date_gmt":"2023-03-21T01:34:26","guid":{"rendered":"https:\/\/www.graviton.at\/letterswaplibrary\/how-to-evealuate-new-members-weed-out-informants-and-agent-provocateurs\/"},"modified":"2023-03-21T02:34:26","modified_gmt":"2023-03-21T01:34:26","slug":"how-to-evealuate-new-members-weed-out-informants-and-agent-provocateurs","status":"publish","type":"post","link":"https:\/\/www.graviton.at\/letterswaplibrary\/how-to-evealuate-new-members-weed-out-informants-and-agent-provocateurs\/","title":{"rendered":"How To Evealuate New Members: Weed Out Informants And Agent-Provocateurs"},"content":{"rendered":"<p>  How to evaluate new members&#8230; Weed out informants and agent-provocateurs.<\/p>\n<p>NOTE &#8211; Spy &amp; CounterSpy does not endorse, condone, or encourage any illegal act.<br \/>\nThe material in this article is presented for information, research,<br \/>\nentertainment, and education purposes only. The words &#8220;you&#8221; and &#8220;your&#8221; are used<br \/>\nin this article only for ease of readability.<\/p>\n<p>Assessing the risks.  It is imperative that you run tests to verify the<br \/>\nreliability and integrity of new recuits who are applying to join your cell.<br \/>\nFailure to evaluate recruits will result in your group being penetrated by your<br \/>\nadversary &#8211; much like the militia groups in the USA have been penetrated by the<br \/>\nFBI.<\/p>\n<p>Every time you admit a new recuit into your cell you are risking the security of<br \/>\nyour group. Yes, the recruit might be a bona fide supporter of your cause &#8211; or<br \/>\nhe might be an informant or an agent-provocateur.<\/p>\n<p>The Informant.  The informant is a cell member who is providing information to<br \/>\nyour adversary. He may betray you for money. She may betray you because she is<br \/>\nbeing blackmailed. He may betray you because he is unethical, immoral, and<br \/>\nweak-willed. She may betray you because she has a passive-aggressive personality<br \/>\ndisorder. <\/p>\n<p>The Agent-provocateur.  The agent-provocateur is someone who feigns enthusiastic<br \/>\nsupport for your cause while enticing you to commit acts that are illegal. She<br \/>\nis acting on the instructions of the FBI &#8211; or she may actually be an FBI agent.<br \/>\nYou are being set up for arrest, interrogation, and conviction.<\/p>\n<p>The Mole.  The mole is a cell member who quietly works to sabotage your<br \/>\noperations. He may deliberately forget to do things that result in failed<br \/>\noperations. He may intentionally ruin meetings with specious arguments and<br \/>\npointless debate, often introducing paranoia into the discussion. A typical mole<br \/>\nis a long-time cell member who has been recruited by the FBI, perhaps by<br \/>\nblackmail. Less frequently the mole is an FBI agent who has penetrated the<br \/>\norganization at an early stage in its development.<\/p>\n<p>The Counterintelligence Role.  It is vital that your organization have a<br \/>\ncounterintelligence officer. This is someone whose role is to detect and<br \/>\nneutralize attempted penetrations by the enemies of your organization. Whether<br \/>\nthis is a formal position or an ad hoc role is not important. Someone in your<br \/>\ngroup must take steps to systematically and conscientiously evaluate new<br \/>\nrecuits.<\/p>\n<p>If you don&#8217;t make an effort to defend yourself against penetration by your<br \/>\nadversary, then you&#8217;ll end up like the militia groups in the US&#8230; paranoid,<br \/>\ndisorganized, ineffective, and &#8211; more often than not &#8211; in custody.<\/p>\n<p>  Reveal some sensitive bogus information to the suspected informant, then wait<br \/>\n  for things to go wrong.<\/p>\n<p>Uncover informants&#8230;<\/p>\n<p>Here is how established resistance movements uncover informants.<\/p>\n<p>First, reveal some sensitive information to the recruit &#8211; and only to the<br \/>\nrecruit. For example, you might inform him of the existence of a (bogus) hidden<br \/>\ncache of weapons.<\/p>\n<p>Then wait and watch. If the cache is suddenly discovered by the authorities, you<br \/>\nmay be dealing with an informant. More tests may be required to confirm your<br \/>\nsuspicions.<\/p>\n<p>In serious cases where you&#8217;re playing by Big Boys&#8217; Rules, you might need to use<br \/>\nlive bait. If your adversary is sophisticated and experienced, you might need to<br \/>\nreveal genuine secrets to the recruit you&#8217;re evaluating. For example, you might<br \/>\nreveal the name of a whistleblower who is leaking information to you about your<br \/>\nadversary. If your recruit betrays your information to your adversary, you&#8217;ll<br \/>\nhave lost your whistleblower &#8211; but you&#8217;ll have unmasked an informant before he<br \/>\ncan do too much damage.<\/p>\n<p>  The most reliable method for unmasking an agent-provocateur is to ask him to<br \/>\n  be the first to commit to action.<\/p>\n<p>Unmask an agent-provocateur&#8230;<\/p>\n<p>Here is how any organization can unmask an agent-provocateur.<\/p>\n<p>If the person is full of ideas for future operations, then insist that he lead<br \/>\nby example. Make him commit himself first. Or, to put it another way, make him<br \/>\nincriminate himself first before asking others to risk injury, exposure, or<br \/>\narrest.<\/p>\n<p>If the person balks, then he may simply be &#8220;all talk&#8221;. Or he may be a coward. Or<br \/>\nhe may be an agent-provocateur. In either case, you&#8217;ve called his bluff and now<br \/>\nyou know not to fall for his jive-talk.<\/p>\n<p>Enforce compliance&#8230;<\/p>\n<p>Here is how resistance movements enforce compliance with the counterintelligence<br \/>\nfunctions.<\/p>\n<p>If a trusted cell member brings an outsider into your group &#8211; or reveals<br \/>\nsensitive information to an outsider &#8211; without performing any of these<br \/>\ncounterintelligence measures, then that cell member must be severely<br \/>\ndisciplined.<\/p>\n<p>Depending on your situation, simply ostracizing the individual may suffice.<br \/>\nRevoking his membership may be all it takes to remove the threat he poses.<br \/>\nOr firmer steps may need to be taken.<\/p>\n<p>  Copyright \u00a91998 Lee Adams. All rights reserved.<br \/>\n  Ascii version by: MRF<\/p>\n<div class='watch-action'><div class='watch-position align-right'><div class='action-like'><a class='lbg-style1 like-13870 jlk' href='javascript:void(0)' data-task='like' data-post_id='13870' data-nonce='715e311f58' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.graviton.at\/letterswaplibrary\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='Like' \/><span class='lc-13870 lc'>0<\/span><\/a><\/div><\/div> <div class='status-13870 status align-right'><\/div><\/div><div class='wti-clear'><\/div>","protected":false},"excerpt":{"rendered":"<p>How to evaluate new members&#8230; Weed out informants and agent-provocateurs. NOTE &#8211; Spy &amp; CounterSpy does not&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[27],"class_list":["post-13870","post","type-post","status-publish","format-standard","hentry","category-othernonsense","tag-english","wpcat-7-id"],"_links":{"self":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/13870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/comments?post=13870"}],"version-history":[{"count":1,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/13870\/revisions"}],"predecessor-version":[{"id":13871,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/13870\/revisions\/13871"}],"wp:attachment":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/media?parent=13870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/categories?post=13870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/tags?post=13870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}