CHAPTER VII Print
INTRODUCTION:

Until now we have dealt. with the need to deal with the employee
and the general importance that the mission has that they ]must
perform in the intelligence effort of the government. WE have
discussed the factors that determine the selection in the
recruitment of a presumed employee, inciting an the access that he
should have to information that we wish.

This chapter deals with communications with the employees. An
employee could have the best access possible to information we
wish, but if he is not able to communicate with the agent to
transmit it the operation does not have any value. The ideal is
that the agent comes into direct contact with the employee, but
there are times they have to do it indirectly.

DEVELOPMENT:

A. THREE BASIC CONDITIONS:

1. There are three basic things that the agent must keep in
ind when he considers to communicate with the employee, these are:
Control, continuity and security.

a. Control: The agent is responsible to plan how the
communication with his employees is to be carried out and to test
and guarantee that this is constant. Taking into consideration the
security of his employees, determines the time, place and
circumstances in which contacts will be made. Does not come into
contact with his employees without prior specific approval or a
precise order from the control agent. Before using the system,
must also consider carefully the type and method of material
transmission.

b. Continuity: The flow of information, instructions and
material must be continuous. Every effort possible must be made to
prevent interruptions in intelligence operations. The information
does not have any value it it is not complete, clear and timely.
The operational condition could limit the amount and variety of
communication channels available.

For better results, three separate communication channels must
be established. That is, the normal, the secondary and the
emergency. The normal channel will be used to attend to regular
demands and it is the one that is frequently used. The secondary
will be used in case the normal cannot be used. The emergency will
be used to transmit information or material when the normal as

-90-



--------------------------------------------------------------------------------


well as the secondary are not sufficient. This could be the case
if the normal channel as well as the secondary fail at the right
time or in case that very important information , such as an alert
, have to be transmitted. In the case of an imminent attack or an
order to cease operations to a compromised employee. The emergency
channel could necessarily be the most dangerous, however, it must
be the most secure and quick to the extend possible.

c. Security: In intelligence operations we must consider
the internal security as well as the external. Each member must be
separate from other members in what pertains to knowledge of
operations in general. members are given only that information of
the operation which they need to perform the tasks assigned to
then. The information which is transmitted through communication
channels must be sealed and concealed in a manner that it is
impossible to be read by the members who handle the message. Must
use special envelopes, wax seals and other techniques to discover
if the message has been compromised. Whenever possible must be
materially hidden. The best defense if to prevent any stranger
from finding out that some communication is established or will be
established.

B. PERSONAL MEETING:

Any face to face contact between members of an operation is a
personal meeting. This is the most common method of communication.
Some of its advantages and disadvantages are:

1. Advantages:

a. A greater exchange of information and a better
understanding could be achieved in less tim

b. Questions and answers could be made.

c. A personal relationship is developed which helps the mood
of the employee.

d. It is the best method to train or give specific
instructions.

e. The attitude, veracity and physical and mental condition
of the employee could be evaluated.

f . Offers the opportunity to exchange information, money or
equipment.

2. Disadvantages:

a. Others could associate them if they are regularly seen
together.


-91-



--------------------------------------------------------------------------------


b. There is the possibility of falling into a trap if the
employee is under the control of the guerrillas.

c. Could become very intimately compromised in personal
problems of the employee.

3. Before authorizing a personal meeting or participating in it,
the advantages and disadvantages of the same must be weighted.
Security must be the principal consideration. How could a meeting
take place in a protected area and safe manner? What is the
objective of the meeting? Could this objective be achieved in some
other way? What possible danger is there of compromising the
employee of the CI agent? If after this operational analysis it is
determined that the personal meeting is necessary, must begin to
plan it carefully.

4. The personal meeting could serve as communication channel,
whether normal, secondary or emergency. In considering personal
meetings, the plans must include different contact places,
different times and the procedures that must be used to establish
new contacts. In more than one occasion the interested parties
have not been able to come to the place or at the previously agreed
time, thus it is necessary to anticipate this in the preparations
that are made. If the meeting is for training purposes of the
employee, the CI agent must make certain that he has all the
instructions aids available at the meeting place. These aids could
be maps, photographs, etc.

5. The place in which the meeting will be determines the
finality of the meeting, the operational identities of the
individuals that have to meet and the situation tactic ( i.e.
barriers through which the employee has to pass, combat zones and
areas under guerrilla control). For short meetings, any place,
whether under a roof or in the open air, serves the purpose, but
for extended meetings or for post-orientation sessions. a place
under a roof will be more convenient. many times, when the employee
is a member of the guerrilla movement, the CI agent has to be
careful of keeping the employee outside the area where he could be
recognized. If the employee has to travel long distances to the
meeting place, arrangements will be made to provide him temporary
lodging and food in a safe place. This place must not be the same
in which the CI agent is.

6. The fundamental consideration on planning a meeting is the
time that the employee will be available. If the employee is a
member of a guerrilla movement, his activities must be correspond
to those of other members. He may not be able to slip away, or to
remain away, when it is needed, or during the desired time. The
protection of darkness could improve the security of the personal
meeting in cases where one of the two members could be recognized
by the local,population. Other points to be considered are the
availability of transportation means, the curfew regulations and
the weather prognosis.

-92-



--------------------------------------------------------------------------------


7. It is necessary that both parties be on time when there are
meetings in order to avoid arousing suspicions by being wandering
around the area In which the contact has been established. Must
have a plausible reason for the individual to be in a particular
place at a prescribed time. When the CI agent does not arrive on
time to meetings, the employee tends to be overcome with fear and
could cancel the meeting or any future contact. Be punctual.

8. The number of contacts that operational personnel kames will
be determined by the operational needs, the security and other
factors. Security requires us to maintain a minimum number of face
to face contacts in order to avoid the danger of being discovered.
However, the operational need could require frequent meetings if it
is to complete our mission.

There is no established formula for meetings. The CI agent and
his control agent have to consider each case individually.
Regardless what it is decided, patterns of action must be avoided.
For example, must not always meet-in the same place.. This would
establish a pattern that could be of interest to strangers.

9. The members who participate in personal meetings do so
knowing that there is a certain degree of risk or danger. The
persons going to meet must take great care on going to the place of
the meeting and or coming from it in order to diminish this risk.
They must stop and make certain that they are not followed and to
know what course of action to take in such cases. The best place
for a meeting is one where would be difficult to be followed and to
observe but which allows a clear field of vision to those who are
taking countersurveillance measures. The place must be one from
which the surroundings could be adequately watched. Surveillance
must not be neglected even when the meeting is taking place. If
the meeting is taking place under a roof, keep the voices low and
if possible to play the radio or the record player. This will make
it difficult for the guerrillas to use technical radio listening
devices and could impede those who are listening concealed from
hearing the conversation. The planning of any personal meeting
must include escape measures in the event the meeting is
discovered. The members who attend the meetings must know paths,.
roads, and other local entrances and exits. If the meeting is held
under a roof, make ceratin that the employees know where the doors,
the windows and any other escape routes that could be used are.
Ascertain beforehand that all escape measures have been well
considered and that the employees know what they have to do in case
of emergency. Procedures must have been anticipated to establish
new contacts in case that such an emergency occurs. When a meeting
is held with an employee whose loyalty is doubtful or whose actions
could be suspicious, the CI agent must have armed assistants posted
in hidden places close to the place of the meeting to help him if
that is necessary. The planned precautions, not known to the
employee, are a good guarantee against kidnapping or capture on the
part of the guerrillas. Exercise care when dealing with employees

-93-



--------------------------------------------------------------------------------


who carry weapons and must not allow to be placed at any time in a
situation in which could be intimidated.

10. If for any reason a person does not come to a planned
meeting, it should be considered to have the meeting held at a
different time and place previously arranged. The Ci agent and the
employee must agree that if for some unforeseen reason lose
contact, both would come on a certain day or days to a specific
place. This is known as an "arranged meeting". There the one who
did not come to prior meetings indicates with a signal if he can
approach or not. If the indication is affirmative, the meeting is
held.

11. A signal is a gesture, symbol or word arranged between the
individuals to indicate a secret understanding. For example, you
have agreed with an employee that he must look for a rock under a
specific tree along a specific road that he takes every day to go
and come from work. The presence of the rick signifies that they
have to need that evening at a place agreed beforehand. If he does
not find the rock, no meeting is planned. This is only one example
of the way that signals could be sued to determine the place and
time that they could meet. The possibilities are almost unlimited.

12. If the persons who are going to a personal meeting do not
know each other and it is the first time they meet, we use an
identification signal. This serves to establish the identity of
the two individuals as authorized members of the organization.
These signals are verbal crosswords that must seem part of a normal
conversation . It is simple an " identification request" and a
"countersign"-. For example, you, as the CI agent, have given
instructions to a messenger to go to a meeting place in order to
pass a message on to an employee who will be expecting it, whom he
has never seen. The messenger approaches the man and asks him ,
"Are you Juan's friend?" ( the identification signal previously
arranged for the employee). The employee answers, "No, but I know
his brother". (The response previously agreed for the question).
This allows the two that they can confide to each other and they
can continue with the mission that brought them there. They must
establish different identification orders and instructions for each
employee and the agent must note that they-do not forget them. In-
this sense, it is essential to train each employee to be certain
that there is complete understanding and to test his ability to
remember the "identification" signals assigned to him.

The questions and answers must be sufficiently simple,
distinctive and current so not to arouse suspicion in case someone
bears them.

13. At times, the recognition procedure requires that each
interested party presents a previously agreed object that cannot be
easily duplicated. For example, A and B must present a dollar
bill, both bills bearing successive numbers. There was a time in

-94-



--------------------------------------------------------------------------------


the intelligence services where a number of countries would divide
an object in two parts and give a part of each one to parsons who
had to hold a meeting. However, an intelligence service arrested
both secret agents, each one with half of the same dollar bill in
his wallet. This way, the identification means# the two haves of
a dollar bill, constituted proof that those two individuals who
denied knowing each other belonged to the same conspiring
organization.

14. The dialogue agreed between the interested parties, which
serves as a watchword must be specific, on the contrary, could be
deceptive and be a cause for difficulties, just as they occurred in
the following incident. In Germany, a young CI agent was sent to
a specific suburban bus stop in Berlin with instructions to meet
with a messenger whom he did not know and to deliver a powder box
that contained a roll of secret film. on arriving at the bus stop,
the young man observed immediataly a parson who entirely answered
the description of the men that he was supposed to meet. He
approached him, smiled and said to him. " I am a tourist. I
admire your beautiful country". "Yes, it is vary beautiful, I am
also a tourist", responded the man. His response was exactly what
had been agreed. The young CI agent informed must later that ha
was ready to deliver the package to the stranger, when he suddenly
explained, " this is my bus" and quickly boarded the vehicle.

15. In meetings in which the interested parties are known and
have been working together, a series of different signals is
issued. While waiting at an agreed meeting place, the employee
executes some positive act so that the CI agent may know that he
believes that the conditions do not offer any danger for the
meeting. This wants to say that he has taken the necessary
countersurveillance measures to attend the meeting, he is not
suspected and expects to establish contact with him.

p. A danger signal is used to warn the CI agent to stay away
from the employee. The absence of a security signal constitutes
the danger signal. In other words, if a security signal is not
given there is danger and the CI agent must not meet with the
employee. If the employee uses a positive signal to indicate that
there is danger, there is the probability that signal could be
observed by the opposition thus placing in danger the CI agent, the
employee and the operation.

C. OTHER METHODS:

1. The telephone must not be used in any way to transmit
intelligence information. It is almost always used to arrange
personal meetings. The CI agent must be aware of the fact that his
telephone as well as that of his associates could be intercepted.
Therefore, he must not use his own telephone to communicate with
his employees. It is best to use public telephones in such
occasions. on arranging a meeting with an employee by telephone,
must try to

-95-



--------------------------------------------------------------------------------


deceive persons who may be possibly listening concealed by
changing the time and place of the meeting. For example, if he
wishes to sea the employee on Wednesday at 8:00 p.m., if the agent
adds " at your home or my home", that could signify the principal
or alternate meeting place.

2. If there is a justified reason to suspect that the telephone
of the person that is being called is intercepted, must be double
careful. On answering the call the employee, the CI agent could
fake that he has called the wrong number, excusing himself in a
specific manner hang up. That would be an indication that will
give the employee to understand that he must go to a specific
public telephone, where he will call him in an hour and, if not
being there at that time, a half hour later than the agreed one.
Both persons must agree before hand to the significance of a number
of phrases and some few indispensable terms that would allow them
to express mutually simple things of their line. They must invent
brief coded expressions for emergency situations that would allow
the employee to inform his CI agent that he is under
surveillance,for example that his house has been searched and they
have seized compromising data, etc. Change a call from a private
telephone to a public telephone is a general practice used much by
intelligence agencies because it offers the possibility that their
employees can talk without fear that the telephone call is
intercepted. This way, they could maintain daily contact with
different employees using various telephones.

Radio communications have given place to many significant
changes in the intelligence practice. The true value of
intelligence is related with the quickens that the employee can
supply information to his superiors. Radio communications have
tremendously increased the speed of CI. Besides the quick
transmission of intelligence, radio communications have increased
the control factor. In the past, when an employee entered an area
dominated by the guerrillas, he was outside the immediate control.
if it was necessary to change the orders of the employee, the CI
agent had to deal with the problem of having to communicate with
him quickly. Likewise, the employee could not transmit quickly the
information that he had obtained, not been able either to receive
new instructions or additional instructions while he was in an area
dominated by the guerrillas. The :result was that the CI agent
lost effective control as soon as he entered the area of the
guerrillas. The use of the radio, either the radio receiver or the
transmitter - receiver has improved the control of the employee as
well as the timely receipt of intelligence information.

The introduction of the radio in the information gathering
technique has also raised new problems in addition to the
advantages that it presents. A problem is that the operation of a
transmitter-receiver requires a technical skill which is difficult
for may employees. When this is so, must recruit to the extend
possible persons who have technical ability in the operations of

-96-



--------------------------------------------------------------------------------


radio transmissions and in the repair of equipment. Another
problem is that which radiogoniometry equipment raise. This
technique has been perfected to the extend that it is possible to
indicate with precision the house from where the radio transmission
is made in a large city like London or New York or in a rural
district not densely populated. Through a constant surveillance of
all transmissions, those of unknown origin could be separated from
those of known origin. When it stumbles on a transmission of
unknown origin, radio markings are taken from two radiogoniometry
stations located at different places. These radio markings are
traced on a map and their intersection will indicate the general
position of the unknown transmitted.

Two radiogoniometry stations are sent to the area and repeat the
proceeding. This will define more exactly the position of the
transmitted in the second stage. In the third stage the apparatus
succeeds to precise a general area, in a street or in a field. In
the fourth stage, could indicate exactly a particular house.

In spite of the efficiency of the detector apparatus, the radio
operator has the means to avoid being captured. only in cases of
need he will work in a hose or group of isolated houses. Normally,
if possible, hides in a large and noisy city. He must always think
that the opposition is aware of his presence in the city, and he
must not remain in a single place and transmit from well separated
points.

In the first phases of an insurrection, the technique of basic
communications must be personal meetings, the radio is mentioned
since the guerrillas may have been successful in the early stages
to control certain areas which are inaccessible for a CI agent.

INVISIBLE INKS: The same like the radio, invisible inks are used
when an agent and his employee cannot be seen together for security
reasons. They are still used extensively. In order to be
effective they must have three qualities: They must pass unnoticed
by the opposition, must be easy to use and must be in a form that
the employee can carry with him without raising suspicions in case
his belongings are searched.

In order to read them, they have to be developed. The inks
which are used have developers. Intelligence laboratories have
worked to find inks whose developments are unknown to the enemy.
These inks have reached such a point that although they are easy to
use them, their development requires a complicated process. This
limits the casual use that could be offered to CI agent and his
employee.

The use of inks is extensive when the two are in different
countries. In the first stages of an insurrection this technique
is only used if the employee is in a delicate position and the
contact could place the operation in danger. If the guerrillas
gain

-97-



--------------------------------------------------------------------------------


control of the area then the inks, the same like the radio,could be
used.

MICROPHOTOGRAPHY: It is possible to reduce a page to a point of
a film that is not larger than the head of a pin with this method.
In reducing the documents, this microphotographic point can be
treated to appear like an white opaque point that could be attached
to a piece of paper or on an envelope and it is highly difficult to
discover. The person who is going to receive it has been provided
a "developer" which he uses an the envelop so that the point loses
its opacity and appears like a black visible point o naked eye.

This technique has its disadvantages.

The apparatus necessary to do it is very large and complicated
to give it to employee. This signifies that it only has one use,
from the CI agent to employee. The employee will need a microscope
with a magnification power of not less than 200 times in order to
be able to read the microphotographic point. An employee who has
a microscope of this kind could be reason to be suspected.

CRYPTO: This word signifies "something hidden", it serves to
distinguish among "key" codes and "codes" because it refers to all
systems to convert a secret ( by means of symbols) to a "normal
text" or a " clear text". The general term in all this field is
today "cryptology", There are two sections:

The cryptography that has to do with preparation, projection,
invention or protection of keys and codes for the use of our
government.

The cryptoanalysis, has to do with the simplification and
decoding of cryptograms, which is the translation of intercepted
foreign messages in the correct language.

The art of preparation of our own messages in keys or in code is
to write test by means of cryptography. The translation of our own
messages and their writing in normal and current language is,
however, "decoding".

A cryptogram is any coded document or message written in code.
" Communications intelligence" is information that has been
achieved through satisfactory cryptoanalysis made of third party
messages.

Certain keys and codes could be deciphered though analysis of
the intercepted messages just as the cryptoanalysis, or in a more
dramatic and simple way by obtaining copies or the books of the
codes or information about the codes which the opposition uses or
through a combination of these means.

-98-



--------------------------------------------------------------------------------


Normally, when communication with employees is indirectly
carried out, whether by rad io or through postal or messenger
means, for security reasons the message must be written in an
enigmatic or unintelligible way, something that is usually done
through a system of keys and codes.

In a code, a certain word, symbol or group of symbols is
replaced by a word or even by a group of words or a complete
thought. We have, therefore, that "XLMDP" or '79648",depending on
the code, whether letters or numbers are used, could signify "war"
and each time they will appear in the message that is what it will
signify.

In a key, a symbol, such as a letter or a number, represent only
a single letter in a word. Therefore, "b" or "2" could signify "e"
or some other letter. In simple keys, the same symbol always
signifies the same letter. In complex keys that are used today,
the same symbol would represented a different letter each time it
appears. At times a message is first prepared in code and then in
key.

MAILBOXES: In order to avoid face to face contacts among
operational elements, a system of mailboxes could be used. A box
is an a safe hidden place, designated beforehand, where a person
leaves information or material to be later picked up by another
individual. A mailbox is a means of avoiding personal contacts
among individuals of an operation in case one of the members is
apprehended. He cannot provide information about the operation
other than the fact that he picks up orders in a box and leaves the
information in another box. The CI agent must understand that the
use of mailboxes entails certain dangers since the material could
be temporarily out of his control and may be exposed to be casually
discovered. The material which is placed in a mailbox must remain
there the least time possible according with the operational
conditions. The longer it most remain there, the greater is the
risk of being discovered. In order to avoid the establishment of
a pattern, must not use the same mailboxes repeatedly. They must
be changed as frequently as the operational conditions allow.

In selecting the hiding places that have to be used as.
mailboxes, the following considerations must be kept in mind:

Access: Hoe close it is to person who are going to use it? Can
it be used without deviating from the normal activity pattern? Can
it always be used or only during the hours of the day or night?

Whether conditions: Will it be difficult to find it in rainy
conditions or in other weather conditions? Would require a special
envelope to protect the content in bad weather? will extreme or
extraordinary weather conditions allow to reach the area?

Compatibility: Could the individual who walk freely through

-99-



--------------------------------------------------------------------------------


the area do it without drawing such attention? Is it in a place
where certain type of people frequent ( campers, hunters, etc.)?

Size: How big is the material that is going to be placed in this
hiding place?

Security: Is the mailbox located in an area where there may be
danger? Could the employee use it without being captured by enemy
forces?

Description: Could it be easily described in a way that a
stranger could locate it by only following your instructions?

There are also certain signs that must be used with mailboxes
for maximum security. These are the "in" and "out" signs. When an
employee or a CI agent places material in the mailbox, one or the
other goes to another place designated in advance and indicates by
means of a sign to whom provides the service that he has a message
"in" the hiding place. This could be done in many ways, a chalk
mark in a certain building, etc. The sign must be made as far
possible from the mailbox, so that the person who provides the
service may take the necessary precautions of countersurveillance
on going or coming from the point where the sign was made. Once
the person picks up the material in the hiding place. he must go to
a new place and make the "out" sign. This serves to inform the
person who places the message that it has been transferred without
incident. The distance from the place where the sign is made is
determined by the same security precautions that are used in making
the "in" sign.

The mailboxes must not be close to houses of the employees. If
a mailbox is accidently discovered, that could be reason to suspect
everyone in the area. The mailboxes must not be close to bridges,
railroad terminals, tunnels and other areas that could have
military significance and therefore be protected zones.

HUMAN MAILBOXES: It is someone who temporarily safeguards
information or material left by a person to be picked up by someone
else later. The person selected as human mailbox must be one whose
profession offers him the opportunity-to deal with people of. all
social layers. A plausible excuse must be established that gives
reason to repeated visits that member of the organization make to
use his services. Doctors, singers, shopkeepers, etc. make good
human mailboxes.

THE MESSENGER: Is an individual who knowingly carried messages
and material between points or operational individuals. He must
not know the content that he carried or the true nature of the
material. The best person for this post is one that may have the
capacity to walk among the operational elements without being
suspected. This person could be a bus driver, a salesman, a
traveling salesman, etc. In many situations, women are the best

-100-



--------------------------------------------------------------------------------


messengers. Women frequently do not have someone to whom to
account for their time; they are subject to military service and in
most cases they are not, like the man, exposed to careful searches.
They must always use camouflage and cover methods to hide the fact
that the messenger is carrying a message. The CI agent must be
certain that the messenger's knowledge is limited to what he needs
to know. They can be used among members of a network that does not
hold meetings, but must be careful that the messenger does not got
to know all the members of the network. The messenger must be
trained in the methods used to discover if he is watched and the
different uses given to signals, to mailboxes and personal
encounters.

ADDRESS OF CONVENIENCE: It is one in which the custodian could
receive a form of public communication ( letter, card, telegram,
etc.) and keep it to be picked up or delivered to the agent or a
designated person. The custodian must not know the true nature of
the content of the messages sent through him. These messages are
normally harmless letters that contain concealed sings. The
custodian must have a plausible explanation to receive the
correspondence and a logical reason to put him in contact with the
person that will eventually receive it.

This type of communication is satisfactory where postal services
are fast, safe and adequate. It can be used when an employee could
become a suspect if he receives it at his own address>

Many times, employees are apparently searched by the police
because of their illegal participation in the guerrilla movement.
Consequently, the police as a routine matter could confiscate any
correspondence that is sent to the house of the employee. A letter
send to a third party, previously recruited and trained could be
possessor of an address of convenience, it could be picked up by
the employe. The letter must be addressed to the custodian of the
address, however, he must be warned through an agreed signal in
advance on the envelope or in the letter, that the correspondence
is intended to a particular third party. This sign could be part
of the text of the message or the way the stamped in placed, etc.

If necessary the signs of the sender on the correspondence that
is mailed to an address of convenience, must be a true address,
although must not be the name and address of the person related
with the information network. Usually the best current names are
randomly selected from telephone books, advertisements, etc.

SAFE PLACES: The CI agent and his employees are constantly faced
with the need of looking for areas where they could keep their
activities concealed from foreign elements. These areas, under
roof or in the open air, are known as safe places. A safe

-101-



--------------------------------------------------------------------------------


place is a place ever which a certain degree of control is
exercised. When the place is in open air, such as a clearance in
the forest, a "vareda" (sic) in a mountain, a bench in a park, etc.
I it is known-as a safe place. Nevertheless, if the safe place is
a residance,building or shelter of some kind, at times it is known
as a safe building. We constantly look for desirable safe places
when meeting of long duration have to be hold. 0 safe place could
be used to conduct meetings, as temporary lodging of employees and
for storage of material that must not be compromised.

A good safe place must have various approaching avenues and must be
selected taking into consideration countersurveillance measures.
Because we call a place safe, it does not mean that it is safe.
The users must be constantly alert to any possible discovery or
compromise.

The operator must maintain a record of the safe places and their
use. If one of the places is exposes, it must be avoided for all
future contacts. A saf o building must not be used in the
recruitment of an employee or in operations with employees whose
loyalty is unknown. Like in all phases of the operations, it must
be emphasized that contact among employees must be avoided. They
must remain separate and not be allowed to use the same saf e
places. On using a building, the different buildings that may be
under your control must not be revealed unless the operations
demand it. Although it is possible that various employees may have
to come to the safe building, care must be taken that all may not
be informed of the relationship that each one has with the
operation. Change the dates and times of meetings among the
sources and the agent in order that they do not meet coming or
going from the safe place.

D. STORAGE:

1. Storage is the process of hiding equipment or material
with the aim of being collected for use in support of an
operation at a future date. In many occasions an employee will
have to be provided food, medicine, money or other material to help
him in carrying out his mission. He may be located in an isolated
or unknown area where be does not have the necessary articles at
his disposition. In such cases, it is the responsibility of the CI
agent to make certain that the required articles have been placed
in a way that the employee could get then as the need arises.

2. There are three storage methods, these are:
a. Burial
b. Concealment
c. Submersion.

The burial is the one used most and which offers a high
degree of security. The person doing it must keep in mind the
following four steps which are very important:

-102-



--------------------------------------------------------------------------------


a. Packaging:

(1) He must select a water proof wrapping of
appropriate size to accommodate the material.

(2) Must inspect each article to see if it is in
serviceable order before placing it in the package.

(3) Must protect all articles individually in order to
prevent breakage.

b. Location selection:

(1) Be must choose a physical and operationally
accessible art& to personnel in charge of picking up the material,
as close as it may be possible to a permanent and identifiable
terrain characteristic.

(2) Must not place anything in an area that could have
military importance ( under a bridge, railroad, military barracks,
energy centers).

(3) Must select a place that offers a certain degree of
privacy.

(4) Must select a place as close as it can possibly be
tot he area where the material is going to be used.

c. Location:

(1) Must have a logical reason to be in the area.

(2) Must place the material as quick as possible,
having planned in advance the best time to do it.

(3) Must be informed of the enemy security forces which
are operating in the area.

(4) Must make sure to inspect the area after the
placement to make certain that it looks the same as before he
placed the material.

d. Record:

(1) Must prepare a record of the storage place in order
to be able to find it easily.

(2) Must annotate in the record the material he placed
at each location.

(3) The instruction for picking up the material must be
always simple; may include sketches, maps, photographs and any
other information that could be of assistance.

-103-



--------------------------------------------------------------------------------


(4) Must record the date, time, and circumstance of
placement.

SUMMARY:

Various ways communicating with your employee have been
discussed. it was emphasized that in the guerrilla early phases
personal meetings are the best means of communication with your
employee.

A. The advantages of these meetings are:

1. To provide a better harmony and understanding with your
employee.

2. To give you more control in that in a direct way you give
him instructions, you receive the information and you pay him.

3. It allows to continuously evaluate your employee.

4. Provides you a more effective way of recruiting an
employee and to terminate his services.

5. Allows the CI agent and the employee to be in the same
area during the early phases of insurrection.

B. The disadvantages of these meetings are:

1. If the employee works for the resistance, he will be
closely watched by other members of the movement.

2. If he is a "secret agent" he could then obtain descriptive
information regarding the CI agent and the meeting places.

3. Unless they have an obvious reason to be together, they
could arise suspicions of other observers.

4. The CI agent, in as much as he may know his employee
better, he could lose his objectivity in his relations with the
same.

The telephone must be used only to arrange meetings and to
transmit information, except for information that may be highly
important. The telephone user must rely on public telephones and
avoid using his private telephone, because this could be
intercepted. The telephone messages must be coded.

The radio, messengers, safe places, microphotographic points,
invisible inks, hiding places, codes and keys, and the storage are
all valuable means of communication when it is not desirable or a
personal meeting is not possible. It is possible that these
techniques could be used in the early phases of the insurrection,

-104-



--------------------------------------------------------------------------------


but this is even more probable. If the guerrillas are successful
and achieve control of certain areas, the CI agent could be forced
then to use some of these communication methods. The examples
given are intended to show you that it is not necessary and perhaps
even undesirable to be complicated in your communications with the
employee. The essence of your communication system with the
employees is that the means which you choose are secure and
continuous.

-104-