Publisher's NoteForeword by William HoodIntroduction1. What Is Counterintelligence? 2. Who Goes into Counterintelligence, and Why?What Is Peculiar about CI OfficersCI Traits: Do You Have Them? 3. Conflicting Goals: Law Enforcement versus ManipulationCops with a CI JobSpymasters with a CI JobCops and Spymasters, Mingle and Merge! 4. The Support ApparatusThe Roof and the WallsSurveillance TeamsThe Bug and Tap ShopSafe HousesThe Forgery ShopVehiclesPhotographyDrops: Live, Dead, PhoneFlaps and Seals, Microdot, Secret InkWeaponsLocks, Keys and BurglaryDisguise 5. Interrogation: How It Really WorksThe Myth of TortureThe Compleat InterrogatorPressureThe Schmidt StoryWhen the Tricks Don't WorkThe Breaking Point 6. How to Manage the PolygraphWhat the Polygraph IsHow the Polygraph WorksWhy Do You React to the Polygraph?What Your Reactions MeanKnown Lies and Surprise QuestionsWhen the Polygraph Works as a Lie DetectorWhen the Polygraph Does Not WorkCan You Beat the Polygraph?What the Polygraph Is Used ForHow the Polygraph Is Misused7. How to Manage Physical SurveillanceLocal ConditionsCoverCompartmentationCommunicationsVehiclesCameras and Audio GearWeaponsThe Half-Life of a Surveillance Team8. How to Manage Technical SurveillanceRemember the Support FunctionKnow Your TechniciansTelephone TapsHidden MicrophonesPhotography through the KeyholeMail InterceptCollating the Information9. Double Agents: What They Are Good ForContact with the EnemyThe Playback Double: The Case of Janos SzmolkaDangles-Controlled and FreelanceLevels of Contact with the EnemyAllocation of Resources10. Double Agents: How to Get and Maintain a StableAssessing Your OpponentsCollating LeadsPlaybacks11. Double Agents: Feeding and CareEmotional DependencePhysical DependenceTestingTermination12. Double Agents: Passing Information to the EnemyThe Doctrine of LayersPassing the Enemy's TestsBalancing Cost against GainThe Bureaucratic ProblemThe Build-Up LibraryThe Use of Collateral13. Moles in the Enemy's Garden: Your Best WeaponStrategic PlanningHow to Get PenetrationsArranging the FurnitureResearch and TargetingPlanting the SeedMotive: Is Ideology Dead?Who Is in Charge?WeaknessesMichal GoleniewskiTraining or Indoctrination?Evacuation14. Defectors: Your Second-Best WeaponInducementEchelons of HandlingBe PreparedResettlement15. Using "Friendly" Services, Foreign and DomesticThe Reasons for LiaisonHow Liaison Works in PracticeCooperation versus CompetitionLiaison and Penetration16. How to Manage FilesChronological FilesIndexing by NameCase FilesDossiers and P-FilesDossier NumbersDossiers and Privacy17. The Collation of CounterintelligenceWhat is Collation?Categories for CollationUsing Computers18. The Big Game: DeceptionThe Tools of DeceptionThe Practical LimitsThe Rule of Unwitting ToolsThe Secret Body Needs a Bodyguard of Lies About the Author