blackeagle opskit 2.0

122
Introduction 1 The BlackEagle BlackEagle Operatives Kit Tactics and Techniques for Getting the Job Done, Getting it Done Right, and Keeping Yourself Alive While Doing It 1999 Edition, v2.0 Publication Number 167A BlackEagle/BlackEagle Security and Investigations Corporation Logistics and Procurement Branch Atlanta, Georgia

Upload: glen-terry

Post on 18-Aug-2015

16 views

Category:

Documents


11 download

DESCRIPTION

Field Ops Kit from Millennium's End RPG, but useful for any modern game

TRANSCRIPT

Introduction 1TheBlackEagleBlackEagleOperativesKitTacticsand TechniquesforGettingtheJobDone,GettingitDoneRight,andKeepingYours elfAliveWhileDoingIt1999 Edition, v2.0Publication Number 167ABlackEagle/BlackEagle Security andInvestigations CorporationLogistics and Procurement BranchAtlanta, GeorgiaThe BlackEagle/BlackEagle Operatives Handbook 2ForwardBack in 1994, when there were only forty or fifty people working for thiscompany, then Senior Operative Charlie Doyles idea of setting up atraining course for new employees seemed a little ambitious. Sure, wewere adding two or three offices a year and bringing in half a dozen newoperatives each month. But at the time it seemed like there were enoughex-cops, FBI men, and special forces guys to fill our requirements, andthese people didnt need much extra training. But Charlie figured itwouldnt be too long before we would be hiring people with more diversebackgrounds, and sending them into a broader range of assignments. Heconvinced me then, and it turned out he was right. We still hire our shareof military veterans and secret-service retirees, but we also bring incomputerspecialists,law-schoolgraduates,andevenex-cons. TheBasic Operative Training Course, which Charlie first put together in 1995,has made sure that all of our operatives, regardless of their backgrounds,have a good foundation of training in the kinds of things we do.But the truth is, we do too many things for each operative to be anexpert in them all. Thats why operatives work in cellsan arrangementthat takes advantage of the strengths of everyone involved. Unfortu-nately, even this system doesnt guarantee that every cell is strong inevery type of task. The Basic Training Course has been expanded threetimes since it was instituted, but it still barely touches on some of the tasksthat are very important to your success, and even your life.In 1998, Alex OGrange, head of the Operations Branch, suggesteda reference manual that would sort of fill in the gaps. The proposed bookwould cover many of the same fundamentals taught in the Basic Trainingcourse, going into a little more detail on the kinds of activities we carry outthe most. With a copy of this book in the hands of every operative, skillsIntroduction 3that might be forgotten (or simply never fully covered in training) wouldstay fresh, and there would be a company SOP on common tasks. Iinstructed the L&P Branch to get started on this book in August of 1998,and assigned a team of four personnel from Operations and L&Pstraining department the task of writing it. The first edition hit the streets inearly 99, and the response was overwhelming. We blew through the firstprinting in a week, and operatives from every office started sending intheir ideas for an expanded edition. Well, here it is.One of the most basic decisions that had to be made before writingthe first book regarded our philosophy of instruction. A number of people,myself included, were worried that we would create a book with a capitalB, as in by the Book. Anyone whos worked for this company longknows how we shy away from top-down commands, especially when itcomes to your cell and how you carry out your operations. We didnt wantto create a set of rules that people would interpret as the only, or even thebest, way of doing things. The broad range of our activities means thatwed need a thousand variations of a thousand tasks to cover everycontingency, and thats impractical even if we wanted to do it. What we didwant to do was to gather the wisdom of experienced operatives, expertsin their specialties, so that you could learn from their experiences. I thinkthat has been achieved with this book. You, the operative who will benefitfrom this accumulated knowledge, must remember that these are justguidelines. Incorporate them into your own SOP, but dont feel that themethods contained here are the only methods available. As always, Iencourage you to rely on your own resourcefulness.I want to make one additional point. The strength of a BlackEaglecell is in the individual operatives, and how they act as a team. In any sortof taskespecially the kind of trouble we get intoyour coordination willmake the difference. Learn to work together well. Practice. Develop yourown ways of doing things. Act as an organism, so that your response tothe unexpected is effective and smooth. Rely on one another, and bereliable.I hope this book makes your job a little easier and a little safer. Keepyour L&P rep informed of any changes you think it needs, or anything notincluded that should be. Like the Basic Operative Training Course, thishandbook will continue to evolve over time, to meet the needs of ouroperatives and the constantly-changing nature of our assignments.And best of luck out thereeven the best need it sometimes.Clifton BlackEagle, PresidentMay 16, 1999The BlackEagle/BlackEagle Operatives Handbook 4TableofContentsChapter 1: Inves tigation Management 8The Investigative Process 9Types of Investigations The Requirements of EvidenceYour Legal Rights and AuthorityBasic Leads 16Clients, Victims, and Witnesses Motive, Benefit, Knowl-edge, and Opportunity Vehicles Evidence Analysis andForensics Criminal Records Informants SurveillancePublic Record Sources Private and Restricted-AccessRecord Sources Other LeadsEvent Investigating 40The Event Scene Preliminary Investigation Picking up aCool Trail Continuing Investigation Evidence HandlingBackground Investigation and Information Searches 54Background Checks Smokescreens and Hidden InformationChapter 2: Protecting Yours elf and Thos eAround You 62Home Security Movement and Public Activity TravelProtecting Yourself on the JobChapter 3: Phys ical Security andSurveillance Sys tems 70Security Systems Instruments of Security Weak LinksChapter 4: Tactical Operations 78The Basics 79Planning Tactical Actions 80Being Prepared for the Unplanned IncidentTactical Principles 84AssaultandSupportSecurityStealthandSpeedSectors of Fire and DefenseRules of Engagement 96Non-Lethal Weapons Appropriate AmmunitionCommand, Control, Communications 100Introduction 5Movement in the Tactical Environment 102RallyPointsandObjectiveRallyPointsLink-upsApproaching the Objective Danger AreasBodyguarding and Personal Security 112Types of Jobs and Threats The Rules of BodyguardingPersonal Security TacticsUrban Problems 118MovementintheUrbanEnvironmentUrban TacticalHazardsClearingaZoneStormingaBuildingSuppressing a SniperInterior Problems 130Moving Indoors Interior Tactical Hazards InfiltrationClearing a RoomField Problems 138TacticalTravelintheFieldFieldTacticalHazardsPatrols and Patrol Bases Ambushes Recons RaidsActions on and after the Objective 154Chapter 5: BlackEagle/ BlackEagle:Company Methodsand Policies 158The Company 159History and Scope Organization Senior StaffOperations Policy 164Following Policy Cell Organization The OperationsRoster Operative Status Operations RestrictionsContracts Contract Payment Multi-Cell OperationsSafehouses and RelocationSupport 176Office Representatives Equipment Forensics LegalAid Medical SupportSecurity 179Physical Security Operational Security Counter-Sur-veillance Measures Weapons PolicyEmployee Policies and Benefits 182General BenefitsThe BlackEagle/BlackEagle Operatives Handbook 6TheRealScoopThis is the BlackEagle Operatives Kit, a book chock full of tips and tricksfor successful modern roleplaying adventures. You may have noticed, ifyouvescannedthebookalready,thatitslaidoutnotasagamesupplement but as if it were a real publicationan actual handbook forBlackEagle operatives. Aside from this page, and the back cover text, youwont find a single reference to GMs, players, or theMillenniums Endgame system inthis publication. Just loads ofgreat ideasforyourcharacters to use in their adventures.The absence of game mechanics means theres nothing here thattells you how these tips and techniques affect game rules. Thats OKthe ideas in this book arent new rules, and their use doesnt have to beguided by skill rolls or mechanics. Your GM may want to require a PoliceScience, Military Science, or other appropriate skill roll to see how wellyour characters implement these ideas, and many of the tasks obviouslyrequire specific skills to carry out. Use common sense and the samemethods youd use to resolve any other idea or strategy your charactermight come up with for dealing with a hazardous or difficult situation.Theres also no specific information on how the GM can counterthese techniques. Thats also OK. Just remember, none of these tech-niques are foolproofin most cases, many of their weaknesses arediscussed in the text. Even more importantly, your GM is perfectly free tohave his or her NPCs use these tricks against your characters. Playersand GMs alike can benefit from the ideas in this book.The BlackEagle Operatives Kit v2.0Written and illustrated by Charles Ryan, with additional writing by Steve LongSpecial thanks to Kelly Crane, Ryan Pendergast, Cedric Ponchy, and JoniVirolainen, and to the other supportive subscribers to the Millenniums Endinternet mailing listFirst Printing 2001 Hero Games, Inc. All rights reserved. No portion of this text may bereproduced without the written consent of Chameleon Eclectic Entertainment,Inc.Hero Games, Inc.35 Pamaron Way, Suite D Novato, CA 94949www.herogames.comIntroduction 7Using this Book 11Evidence Kits 13What To Do if Arrested 15Fundamentals of PersonalIdentification 17Informants and Witnesses 19Fundamentals of VehicleIdentification 21Vehicle Searches 23Detecting Concealed Weapons 25Knowing Illicit Drugs andtheir Effects 27Following up on Gang Crimes 29Stakeouts 31Shadowing 33The ABC Shadowing Method 35Shaking Tails 37Conducting Interrogations 39Holding out under Interrogation 41Evidence Collection 43Taking Fingerprints 45Dealing with Kidnappers 47Getting around locks 49Cracking Secret Organizations 51Police Investigation Reports 53Autopsy Reports 55Social Security Numbers 57High-speed Pursuit 59Bribery 61A Home Security Kit 65Countersurveillance on the Road 67Office Security Drill 69Security Strategy 73Dealing with Motion Detectors 75Dealing with Wires and Beams 77Working with an OpOrder 81The Five-Point Contingency Plan 83Field Tactical Kits 85Passwords 87Radio Prowords and thePhonetic Alphabet 89Hand and Arm Signals 91Deploying Non-Lethal Gasses 95Deploying Non-Lethal andRestraining Weapons 97Tactical Movement Formationsthe Diamond 99Tactical Movement Formationsthe Wedge 101Tactical Movement Formationsthe File 103Tactical Movement Formationsthe Line 105The Herringbone 107Breaking Contact 109Crossing a Danger Area 111Scroll to the Road 113Personal Security on the Road 115The Hostile Meeting 117Urban Movement Hazards 119Urban Movement Techniques 121Diversions 123Dealing with Hostage Situations 125Searching Prisoners and Bodies 127Trauma in Combat 129Interior Movement Hazards 131Interior Movement Techniques 133Area Search Techniques 135Shaking Trackers 137Field Movement Hazards 139Field Movement Techniques 141The Near Ambush 143Surviving an Ambush 145Field LZs 147Helicopter Insertions andExtractions 149The Objective Recon 151Conducting a Raid 155Techniques IndexThe BlackEagle/BlackEagle Operatives Handbook 8Chapt e r1:Inv e s t igat io nManage me ntInvestigation Management 9Not every BlackEagle assignment is an investigation, but most requiresome investigating. Even in a totally tactical assignment, you may needto do some background research or gather intelligence on your objective.If only for this reason alone, solid investigative skills are necessary evenfor the total grunts amongst us.TheInves tigativeProces sAn investigation is a process of searching for facts, then assemblingthose facts into an understanding of the person, event, or thing beinginvestigated. Good investigation requires several things. You must under-stand your objective. You must know the sources and resources availableto you. But more than anything else, you must have imagination, curiosity,andstamina.Greatanalyticalmindsarefewandfarbetween,butthousands of investigators in the public and private sector make up foraverage IQs by imaginatively seeking out leads and pursuing them withtenacity and genuine interest.Types of InvestigationsIn our line of work, there are three basic sorts of investigations that wecarry out: event investigations; background investigations; and informa-tion searches. Although the distinction between these three types isvague and they often overlap, there are important differences in theirobjectives. Event investigations seek to understand given eventsusuallycrimesto determine what happened and how, and who was respon-sible. Missing persons, thefts, murders, acts of piracy and terrorism, andsabotage are just a few of the many types of events that B/E ops are hiredto investigate. Most of these are crimes, but the focus of an eventinvestigation may be civil, like investigating the cause of an accident foran insurance company. Some espionage assignments, including private-sector espionage, include event investigations. Background investigations gather a large quantity of informa-tion on a particular subject, like a terrorist organization, a business, or acriminal suspect, with the intent of gaining a greater degree of insight intothe subjects activities, motives, and day-to-day existence. Backgroundinvestigations may be assignments in and of themselvesfor example,you may be hired to investigate a company that is suspected of ties toorganized crime. Or, the background investigation might be a subset ofThe BlackEagle/BlackEagle Operatives Handbook 10a larger event investigationlike learning all you can about one of yourmain suspects while investigating a murder. Information searches look for specific pieces or types of infor-mation. Information searches are most often part of another investigation,but may be required in an assignment that is otherwise totally non-investigative. For example, you may want to track down a set of construc-tionplansforabuildingyouwishtoenter.Often,carryingoutaninformation search is as easy as glancing through a GenNet directory. Butwhen a particular piece of information is carefully guarded, a search forit can be a long and difficult task.These general types of investigations can be hierarchical. An eventinvestigation frequently includes background investigations of importantindividuals and organizations, each of which may involve dozens ofinformation searches. When carrying out a large and complex investiga-tion, break it down into its subset background checks and informationsearches. This will help you organize the tasks and carry out eachthoroughly. Be certain, however, to fully integrate the results of eachsegment with the wholeto see the big picture. The key to solvingcomplicated mysteries often lies simply in seeing a relationship betweentwo otherwise insignificant pieces of information. Dont overlook such arelationship because your information is too fragmented, especially whenyou split up different tasks amongst the members of your cell.The Requirements of EvidenceThe role of evidence in an investigation varies greatly depending on thetype of investigation you are carrying out and the needs of the client. Lawenforcement investigators always look to provide evidence admissible incourt, and sufficient to prosecute beyond reasonable doubt. This is notgenerally the case with BlackEagle cells. Sometimes you will need tocreate a watertight case supported by undeniable, legally admissibleevidence. Other times you will only need to satisfy yourself. There are athousand variations in between. To generalize, however, we can say thatthere are three cases: Evidence for your use. Often, an assignment will call for aphysical result, with no stipulation for how it comes about. You may beasked to recover a piece of stolen merchandise, to locate and retrieve ahostage, or carry out some other task that will have to start with someinvestigating. Any evidence recovered in that investigation is for your useonlyyou dont have to satisfy anyone else as to its importance or validity.The evidence is sufficient if it gets results. Evidence for the clients use. Other assignments may requireyoutoinvestigateonyourclientsbehalf,bringinghimorheryourInvestigation Management 11Techniques: Using this BookThe advice and guidelines in this book are presented in two bodies of information: themain text (like that opposite); and the sidebars (on every right-hand page, like this one,throughout the first four chapters). The main text covers investigations and tacticaloperations, important topics in overview, and general methods for getting things done andkeeping alive while doing them. It includes plenty of details and examples, but focusesmainly on theorythe fundamental concepts underlying specific techniques. The sidebarsillustrate specific situations, techniques, and tips. They provide more in-depth informationon the material in the main text, and give examples of specific techniques that you canuse on assignmenthow to detect and slip past tripwires; how to conduct an ambush orsurvive one sprung on you; how to tail a suspect, or shake a tail thats following you. Beingseparated, and located on each right-hand page, theyre handy for quick look-ups. Theoriginal edition of this book featured nineteen such Techniques sidebarsthis editionhas been dramatically increased, with almost seventy.Nevertheless, a book like this couldnt possibly cover every difficulty youll encounter inthe field. Thats why the main text is so importantthe principles it contains are good,solid guidelines that you can apply to a wide array of situations. They are the foundationupon which all the techniques and tips in the sidebars are based. Learn them. Use them.Theyll help you finish your assignments and live to talk about them.As for the Techniques sidebars, remember that every situation is different, and these tipsand how-tos are only examples. If you understand what theyre showing youwhy theyworkyoull learn how to adapt them to the unique situations youll face while out in thejungle or on the streets. That takes us back to the importance of the main text, and thefundamental principles that are so important to understanding your work.Refer to the sidebars when you need them.Read the main text, and learn it if youwant to stay alive.oThe BlackEagle/BlackEagle Operatives Handbook 12conclusions. You may be asked to discover an information leak, look intoa competing corporations activities, or identify the perpetrator of a crime.In such cases, the client sets the standard of proofyou must provideenough evidence to convince him that your conclusions are correct. Keepin mind that sometimes the client may have to convince someone elselike his or her boss, for example. You may need to go beyond the level ofproof that satisfies both you and the client. Evidence for legal prosecution. Sometimes you will be hired bya government agency to investigate a crime, or by a private organizationor citizen that doesnt trust the results or methods of the government. Inthe latter case, you may be working for the prosecution or the defense.The prosecution must prove guilt beyond a reasonable doubt, while thedefense tries to show that reasonable doubt remains. Your evidence mustbe legally admissible, support the goals of your side, and be able towithstand the legal scrutiny of the opposition. Physical evidence is veryimportant in legal cases, and requires special handling and accountability(see Evidence Handling, below).The use of evidence in investigations is three-fold. Obviously, evidencecan generate investigative leads. Some of the most common types ofleads generated by physical evidence and testimony are covered belowunder Basic Leads. Process and consider every piece of evidence youcan get your hands on, even those that seem irrelevant, because younever know how important a piece of information will be at a later stagein your investigation.Evidence can also be used to limit leads. This can be an equallyimportant function, because it can narrow your field of suspects and helpyou refine your theory of events. Take advantage of opportunities to useeliminative evidence. For example, take fingerprints from everyone withregular access to the scene of a crime, even if you dont really suspectthem. When lab comparisons with the prints left by the perpetrator turn upnegative, you can safely remove those people from your list of suspects.Finally, evidence is used in legal prosecution. Legal evidence cantjust tell you who committed a crimeit must prove it. This is a veryimportant distinction, because if a defense can find any reasonable doubtin the evidence provided by the prosecution, the verdict will be innocentregardless of how obvious the guilt of the accused (at least in the UnitedStates). When you are investigating for legal prosecution, be sure youhave good accountability of physical evidence, and that your methodsdont threaten the evidences admissibility. Then, when putting togetherthe case, go through the evidence accumulated, and figure out how muchof it is legally relevant (much of your lead-generating and eliminativeevidence wont be). Bolster it with additional forensics and testimony untilthe case is as airtight as possible. Be sure to consult with your office legalInvestigation Management 13Techniques 1: Evidence KitsYou need a good evidence kit to process an event scene, and its a good idea to keepsome basic evidence gathering supplies on hand all the time. The two lists below covera complete, heavy-duty kit and another, more portable kit you can keep handy.Full-sized Evidence Kit flashlight and portable floods. 50-foot tape measure. 18-inch ruler. photographic equipment, including still and video cameras, tripod, lenses, flash,and color and B&W film. tweezers, forceps, scissors, and razor blades. zip-lock bags in a variety of sizes. jars and boxes in a variety of sizes. garment bags. masking and duct tape. graph paper, notebook, pens, chalk and crayons. a magnifying glass and hand mirror. a fingerprint digitizer or kit. a plaster mold kit. a thermometer. a basic tool kit. a compass. a tape recorder. towels.This complete kit can be put together in two or three good-sized duffle bags or tool boxes.In addition to these items, its a good idea to have specialized equipment, like vacuumsamplers and chemical sniffers, available.Portable Evidence Kit a flashlight. a 12-foot tape measure. an 18-inch ruler. a still camera with flash and film. tweezers, forceps, and scissors. zip-lock bags in several sizes. graph paper, a notebook, and pens.These items can be kept in a small duffle bag or tool box. Keep a kit like this in the trunkof your car or some other handy location where it can be left indefinitely (you never knowwhen youll need this sort of stuff). Always have a kit like this nearby when working oninvestigative assignments.oThe BlackEagle/BlackEagle Operatives Handbook 14counsel, to make certain you have done everything possible to meet yourlegal requirements.Your Legal Rights and AuthorityThe issue of legal authority is well covered in the BlackEagle BasicOperative Training course, but the basics are worth covering again here.It is important that you understand your rights and authorities clearly, sothat you can protect yourself from litigation. Operatives who injudiciouslyoverstep their bounds make themselves, and the company, liable to suitor prosecution for anything from false arrest to assault with a deadlyweapon.In general, an operative has the same legal authority as any otherprivate citizen. In the United States, that means that you can arrest asuspect if the crime was committed in your presence. Only a sworn lawofficer may make an arrest based upon suspicionand you arent a lawofficer. You must have caught the person in the act, and be able to proveit, or you can be prosecuted or sued by the offender (even if hes guilty).Arrest means detaining someone, then forcibly turning him or herover to the proper authorities. The law allows considerably more leewayto detain someone without arresting him. Businesses in most states, forexample, are permitted to use reasonable force to detain someone fora reasonable period of time if there is probable cause to believe that theperson has committed a crime on the premises, like trespassing orshoplifting. However, legal interpretations of reasonable force, reason-able period of time, and probable cause are vague, and may vary fromlocality to locality. As with arrest, detention can be a tricky proposition ifyou are not absolutely certain of what you are doing.Searching another person is even thinner ice. In general, you areonly safe if the suspect gives you permission to searchthat includessearching the suspects belongings as well as their person. The law isvague concerning involuntary searchesand that vagueness is morelikely to work against you in court than to protect you. Generally speaking,if youre searching a person because you know or have good reason tosuspect that theyre carrying a weapon, youre on better legal ground thanif youre simply looking to see what hes carrying.Interrogation, however, is one area that is relatively safe. You canask a suspect anything you want, without giving advice of rights as apolice officer must, and he or she may or may not answer. But there area couple of pitfalls. Questioning a suspect within earshot of bystandersmay make you liable for slander, if the questions imply any sort of criminalwrongdoing. Furthermore, coercive questioning techniques run the risk ofassault and battery charges. A suspect can also go back on statementsInvestigation Management 15Techniques 2: What to do if ArrestedArrest and legal difficulties are an occupational hazard for the BlackEagle operative. Alloperatives and cells should be prepared for the possibility, whether operating in theirhome cities or halfway around the world.What happens on arrest varies dramatically from country to country. In all cases, thearrested persons are removed to a police station, jail, or similar official location, wherethey are generally separated, in-processed (identified and fingerprinted), questioned,and held. In developed countries, and most Third World countries, the arrestee is allowedcontact with the outside worldthe proverbial one phone call is a minimum, and manymunicipalities allow more or even place pay phones within holding cells.At your first opportunity after arrest, call your office. Call the office before trying to reachanyone elseincluding your cell, your family, the embassy, your lawyer, your friends,anyone. There should be someone at the office to take your call any time of day or night,and the office can reach anyone that needs word of your situation. Furthermore, yourSenior Cell Leader and office legal aide can work effectively for your freedom from themoment you contact them, and can coordinate the efforts of your fellow operatives asneeded.Regardless of your guilt or innocence, make no statement to the police without the legalassistance provided by the office. The police may attempt to get you to talk by insistingthat only the guilty need lawyers, or that your fellow operatives have already madestatements. Do not believe themthere is no law or regulation that prevents police fromusing misdirection and deceit in their interrogations, even in the U.S., where policeconduct is constantly subject to legal scrutiny. Even if you are 100% completely innocentof all charges, say nothing without legal helpanything you do say can be used againstyou, and its not unheard of for operatives to face trumped-upor fabricated chargesor even frame-upsbrought bycorrupt officials or enemies of the company.If (once youre in contact with your cell or the company)you must discuss issues related to your current as-signment, be careful. You are not any guaranteedprivacy while in jail, and conversations with visitors oron the phone may be monitored and used againstyou.As in any case in which youre in someone elseshands (see the sidebar on being interrogated, on page41), avoid confrontation with your captors. Behavereasonably and subserviently, regardless of the be-havior or professionalism of your arrestors.The American legal system assumesinnocenceuntil guilt is proven. Most of the rest of the worldeven the developed worlddoes not. In any case,unless the charges against you are very serious andthe evidence very compelling, the company shouldbe able to get you out of jail on short orderbut bementally prepared for the worst.oThe BlackEagle/BlackEagle Operatives Handbook 16made under threat, meaning that coerced information may be of little legalsignificance unless backed up by good evidence.Finally, there is the issue of lethal force. Restrictions on the use oflethal force are the same for civilians as they are for police: lethal forcemay be used in the immediate protection of your life or the life of another,not in the protection of property. If you reasonably believe that your life isin immediate danger (being threatened is not enough, unless the threatis backed up by the display or use of a deadly weapon), you may use lethalforce against the threat. In all other cases, using lethal force makes youliable for criminal prosecution for anything from assault to capital murder.There are, of course, exceptions to all of these cases. Some securityjobs, particularly some connected to the federal government or industrieswith high national security priority, have special guidelines. Make surethat you and your client understand any such guidelines, and includethem as contract clauses.There is another factor to keep in mind. Disregarding the aboveguidelines will make you vulnerable to legal attack if the suspect fullyunderstands his rights and is inclined to prosecute. If the suspect has nolegal recourseif, for example, he is an underworld figure or wantedcriminalyou might be able to act without fear of prosecution. Also, manypeople are ignorant of the limitations that we in the private sector face.People are impressed by an ID card, a gun, and air of authority. You maybe able to bend the rules a little, to act with more authority than you reallyhave. Keep the possible consequences in mind, though, because youalways face some legal risk.Bas ic LeadsThe investigative process consists of identifying your leads, then follow-ing them through. Every investigation is unique, and no two sets of leadsare the same, regardless of the similarity of the cases. Nevertheless,there are a number of leads or lead sources that show up again and again,and almost always get you somewhere when you run them down. Theseare covered in this section.Clients, Victims and WitnessesThe client and, when applicable, the victim, are generally the first leadsavailable to you in your investigation. Use them to develop an under-standing of the context of the investigation, to reconstruct specific events,and to establish your initial leads. Additional witnesses, when available,Investigation Management 17Techniques 3: Fundamentals of Personal IdentificationAsk a typical witness to describe a suspect, and youll probably get something likeaverage height, brown hair. Not very helpful. However, most witnesses retain a lot ofuseful information, they just need some help turning their mental picture into an accurateand concise verbal description. Knowing what to ask can help get that information out ofa witness. Its also useful to have a mental checklist of details for recalling your ownexperienceswhen you want to remember someone youve seen, go through thesepoints mentally when you observe him or her, for easier and more accurate recollectionlater.For your own recollections, its always best to focus on telling detailsrather thangeneralities. Build and hair color are necessary, of course, but hardly tellinga birthmark,lisp, or tattoo is much more concrete. Also, remember that apparent information is farmore important than factual infoin describing a person, how old she is isnt nearly asimportant as how old she looks.Identifying points include: Gender, race, and skin color. The latter is important even when race is identified, as therecan be a great deal of variation.Age. Avoid general terms such as old or youngsuch terms mean completelydifferent things to different people. Get an estimate of age in years, even if your witnessisnt confident about his or her accuracy. Height and Weight. These can be difficult to guess, but a witnessmay be able to make comparisons to bystanders or objects in thearea. Many retailers (especially convenience stores) actuallymark the door jamb, so that employees have a point of referencewhen they see a criminal enter or exit. Build. Speech and Mannerisms. Scars, Marks, Deformities, and Tattoos. Hair. Look for not just color, but also length, part (right,left, center or none), texture, and hairline. Eyes. Get expression and shape as well as color.Facial Features. Most peoples faces can be de-scribed as oval,round, triangular, orlong. Nose,mouth, chin, jawline, cheekbones, placement of theeyes, and facial hair are all notable features. Clothing.Be sure to ask witnesses about all of these potentialfeatures, and make a note of them yourself when-ever you see someone you might need to rememberor describe in the future.oThe BlackEagle/BlackEagle Operatives Handbook 18can help flesh out your understanding of events and give you more leadsto follow.In any type of assignment, the first information you get is about theclient. When you meet with a client for the first time, you see what he lookslike and you size him up. You get a feel for his personality, you learnsomething of his goals, and you are probably told who he works for. Thefirst step in your investigation is to learn even more about the client. Whatis his relationship to the subject of the investigation? To the victim of thecrime, if it isnt him? To the perpetrator, if known? What are the clientssuspicions or concerns? Why does he hold them? Does the client havea criminal past, or has he been a past victim? Most of these questions canbe answered in the initial meeting with the client. The answers can giveyou a great deal of insight into the situation, as well as pointing to somebeginning leads.If this is an event investigation, especially one that involves a crime,turn your attention next to the victim, who may be your only availablewitness. If the victim is not the client, ask the questions in the aboveparagraphconcerningthevictimsrelationshipswiththeclientandsuspect, the victims own suspicions, and the victims criminal past.Regardless, find out the following: if it was a violent event, did the victimhave a weapon? Did he or she use it? Does the victim have an aggressivepersonality? Could the victim have been mistaken for someone else? Ifthe event was a property crime, what specifically could the criminal havebeen after?Now you are ready to move on to other witnesses. Usually, Black-Eagle operatives arent the first called to a crime scene. Chances are,therefore, that you will be dealing with witnesses well after the fact,possibly after they have already spoken with police. In any event, youwant to identify and question witnesses as quickly as possible. Thefresher the witness, the more willing he or she is to talk, the more truthfulhe or she will be, and less likely you are to get an I dont rememberresponse.Ask your witnesses to describe what he or she saw, briefly, butomitting nothing. Get an overview of the event as perceived, as well asspecifics like description of the perpetrator or perpetrators, vehicles,direction of flight, and other activities. Be certain to get the witnesssname, address and phone and GenNet numbers, so you can recontacthim or her as necessary.In all of the above contacts, you want to remain pleasant, sincere,and accessible. Witnesses and victims tend to be more open if you seemfriendly and interested. Remember that theyre on your side, even if theyarent particularly helpful or cooperative. You want to them to come backto you if they learn or remember additional information. Make sure theyhave some way of reaching you, even if you are concealing your identity.For more tips, see the Informants and Witnesses sidebar, opposite.Investigation Management 19Techniques 4: Informants and WitnessesGetting information out of your witnesses and informants is sometimes harder thanfinding them. Witnesses are often frightened, mistrustful, or downright hostile. Theyusually want to know why you are questioning them, and sometimes you cant tell them.Successfully interviewing informants and witnesses, especially reluctant ones, requiresa certain knack. Nevertheless, there are certain tricks and techniques that can make yourinterviews a little easier and more successful.First of all, plan your interview. Even if you take just a few seconds to review your goals,it helps to know what you think you can learn, how you will approach your questions, andwhat your objective is. If you are conducting a covert interview, in which you are maskingyour identity or your intent, you must know your cover story before approaching the target.You cant always choose the time and place for your interview, but at least try to pull thetarget aside, away from other people and background distractions. This will help yourwitness concentrate, and free him or her to say things he or she might not otherwise. Forexample, a witness is unlikely to badmouth an acquaintance in front of a mutual friend,and is very unlikely to say anything self-incriminating in front of anyone. Dont give groupinterviews, and never get a witnesss name or address within earshot of a potentialsuspect.When youve worked out your plan and chosen a location, your next concern is approach.You always want to align yourself with the witness. Be open, even sympathetic, as friendlyas the circumstances allow, but businesslike. Show an interest in what the witness hasto say. Always give the witness room to save facenever use terminology the appearsto incriminate or accuse. Ask questions that invite lengthy answers. Ask the witnessopinion on the events you discuss. Avoid expressing opinions of your own.Dont give the witness any information that telegraphs your own intent or knowledge, evenwith a seemingly harmless witness or in a completely overt investigation. Sprinkle inquestions with little or no relevance, or questions for which you already have the answer.This will keep witnesses from second-guessing you, or divining your intent, and gives youa check on the witnesss veracity.A truly hostile informant, especially one involved with your target or adversary, isparticularly demanding. The temptation is to try to convince him that hes in real troublethat you already know enough to be a threat. But never say things like we know such andsuchwe just need the details. That gives away too much of your information, and ifyoure wrong, youve just demonstrated incompetency to the witness. If you keep askingthe right questions, hell get the picture that youre a force to be reckoned with, and thatrealization is more convincing when it comes from within than when you try to force it onhim.If you must get coercive, remember all the above rules. Play good cop-bad cop. Havethe questioner remain open and approachable, while one or more other operatives do theintimidating. And remember that coercion is more a psychological activity than a physicalone. Torture, besides being unethical and legally risky, is also counterproductive whenits threat can be just as effective.oThe BlackEagle/BlackEagle Operatives Handbook 20Motive, Benefit, Knowledge and OpportunityCrimes are rarely totally random. There is usually a motivethe perpe-trator commits the crime for some benefit, be it financial, emotional, orpsychological. When investigating a crime or event, or even when tryingto understand information unearthed in a background check, look forpossible benefit, knowledge, and opportunity.Who gains from a crime? Does a murder eliminate competition?Was there an opportunity for profit? Was jealousy or revenge a factor?Was the perpetrator simply a psychopath? You need to look carefully atpossible motives, but do not get fixated on the obvious.Next, look at the question of knowledge. Who knew about theopportunity to commit the crime? Who had access to the premises, or wasfamiliar with them? Are there service, security, maintenance, or deliverypersonnel that might be involved? How about a spouse or employee,present or former? Could neighbors be involved? Look into all of theabove, as well as criminal connections that any might have. Also askabout persons recently in the vicinity of the event, loitering, applying forwork, soliciting, or just acting strangely.Next, look at opportunity. Start with the list of names generated bythe questions above, but check out everyone if you have time. Get alibisfrom each of them, and check them out.Discovering motive, knowledge, and opportunity will shorten yourlist of suspects involved in an event. Use your examination of thesefactors to generate new leads and lines of investigation, and to narrowyour list of suspects to a manageable level (as discussed under Continu-ing Investigation, below, a criminal perpetrator will always have motive,means, and opportunity). Then you can gather harder evidence on theseleads. Remember, though, that these elements do not prove involve-mentyoumayendupwithseveralsuspectswithmotive,benefit,knowledge, means, and opportunity, most or all of whom are completelyinnocent of the crime being investigated.VehiclesVehicles are very commonly used in criminal acts, and they provide aunique source of leads. They are easily spotted, remembered,anddescribed by witnesses. Even more importantly, in the U.S. and mostother countries, they are well monitored by the state, which keeps usefuland easily-accessible vehicle records.An automobile registration search must begin with a license platenumber, although in some states you can initiate a search with theowners name. Auto registration records are kept by the state revenueoffice, and contain the plate number, the name of the owner, and the year,Investigation Management 21Techniques 5: Fundamentals of Vehicle IdentificationAs with personal identification, its always a good idea to have a mental checklist forassembling an accurate and useful description of a vehicle. In descending order ofrelative importance, try to focus on the following factorseven if you can only get the factson a few of them, youll develop enough of a description to accurately identify the vehiclelater, or usefully describe the vehicle to other operatives or law enforcement officials. Make and model. If you or your witness cant tell the exact make, at least determine thevehicle configuration: sedan, coupe, mini-van, sport-utility vehicle, pickup truck, etc. If thevehicle seemed like a foreign or domestic style, note that. Year. Most people cant guess the year of a vehicle at a single glancebut they canprobably tell if it is a relatively new (late-model) or fairly outdated style. Color. Two-toned vehicles are referred to by police as color over colortan over red,for example. If the vehicle has a vinyl top, note that fact as well as its color. License Plate. Even if you cant catch the plate number, you may be able to tell at aglance, by its color, whether its an in-state or out-of-state license plate. If you can get aplate number, fantasticbut beware that many criminals put stolen plates on vehicles,an act known as hot-plating or cold-plating, depending on whether the plates are stolenfrom active cars or out of junk yards, long-term storage yards, or other places where theywont be missed or reported. Body Damage. Note the extent and general location. Markings. Commercial vehicles usually have names or logos, and even private cars aresometimes decorated (especially with bumper stickers). Windows. Note whether theyve been tinted, have stickers on them, or are damaged. Modifications. Note any customization to the vehicle. Interior. If you or your witness happens to notice the interior upholstery color, or whetherthere is anything to distinguish the inside, make a note of it.As with personal identification factors, ask witnesses about all of these points, and notethem yourself if you might have to remember a vehicle later.oThe BlackEagle/BlackEagle Operatives Handbook 22make, and model of the vehicle. Similar information is kept on boats andaircraft, and in some states the records are more detailed for these typesof vehicles. However, it is not uncommon for boats and aircraft to beregistered out-of-state, so finding a record might be more difficult. Also,witnesses are less likely to notice boat registration numbers than carlicense plates.Once you have the registration information, you can learn moreabout the owner by checking out his Operators License record (seePrivate and Restricted-Access Record Sources, below).Vehicle records are accessible by the state DMV and revenueagencies, local and state law enforcement agencies, and county revenueagencies (which must access the data in order to assess property taxes).If you cannot access the state databases directly, a friend or contact in anyof these agencies should be able to get the information quickly and easily.Evidence Analysis and ForensicsModern forensic technology makes it harder and harder for a criminal toavoid leaving traces of his actions at the scene, or, rather, makes it moreand more possible for investigators to interpret the very subtle clues thathave always been left. Fingerprint analysis was one of the first majorbreakthroughs in forensic technologies, and the more recent develop-ment of DNA analysis is an equivalent step forward. These importanttechniques help investigators learn the identity of their suspects, but thereare a number of other techniques that identify equipment, tools, clothes,and vehicles, and which can be just as valuable.The key to nearly all forensic investigation is the comparison ofevidence collected at the event scene with recorded information or otherpieces of evidence found elsewhere. For example, a DNA sample from anevent scene means nothing if you have no records, or samples fromsuspects, with which to compare it.Even with those records and control samples, evidence analysis willgenerate two types of results: class characteristics and individual charac-teristics. Class characteristics identify a piece of evidence as coming froma class of sources, but not a specific one. Individual characteristics tie theevidence to a specific source. For example, the chemical compositionand surface pattern of a shard of broken glass may identify it as comingfrom a certain make of car headlight, maybe even from a particular modelof car (class identification). If the fragment can be fitted together with othershards, it may show that it is a piece from a specific broken headlight, andhence a specific vehicle (individual identification).Class identification is inexact in proving the involvement of a givensuspect. But class identification can be used to reduce your suspect list.Investigation Management 23Techniques 6: Vehicle SearchesA clever criminal can hide a small object in a vehicle such that its nearly impossible tofind in a quick search. If you can tear apart a vehicle at your leisure, almost anything canbe found. If you dont have that luxury, a few pointers can help you search a vehicle quicklyand efficiently, to find items hidden by all but the most clever and meticulous of hiders.For best results, its a good idea to have a flashlight and a mirrorpreferably one on anangled handle. Thatll make searches of the vehicles underside easier, along with areassuch as the underside of the dashboard and the engine compartment.On the inside, be sure to check: on the dashboard, and in the groove between the dash and the windshield. behind the sun visors. under the front and rear seats, and the floormats and carpeting. behind the back seat. in the ashtrays, glove compartment and other storage spaces. in cuts or tears in the upholstery. in the space between the seat cushion and the back cushion. in the dome light. in the springs and padding of the seats (accessible from underneath). inside loose door panels.Outside, check behind the license plates. inside the gas cap cover, and in the tank (probably tied by a string from the gascap). under the bumpers. inside the wheel wells. under the vehicle. inside the hub caps. behind retractable headlights. behind the front grille. inside the taillight lenses.In the trunk, check: in, under, and around the spare tire, and in the spare tire well. in the inside of the back seat. in any compartments for tools or the jack. in the underside of the trunk lid. under the carpet or mat.In the engine compartment, check: in the underside of the hood, and inside any molded air scoops. inside auxiliary components. inside the radiator, battery, or fluid wells (again, perhaps tied to the cap or lid). inside the air filter.These locations cover most of the simplest hiding spots, but for a thorough search thevehicle must be totally dismantled.oThe BlackEagle/BlackEagle Operatives Handbook 24For example, bruises left by long, thin fingers on the throat of a strangledcorpse rule out suspects with short, stubby hands.Check with your L&P coordinator or the L&P support labs in Atlantaor London to find out what forensic options are available to you. Here area few of the many types of evidence analysis carried out by BlackEagle,other private organizations and labs, and law enforcement agencies: Fingerprints are very commonly left at an event scene or onother physical evidence. Fingerprint records are very extensive, coveringeveryone in the country with an arrest record, and many others without.Recovering fingerprints is relatively easy, with a digitizer or by hand, andthey can be used to positively identify a suspect or to eliminate others.Fingerprints are matched using a system of identifying points, so a clearpartial print can be more useful than a blurry full print. Palm, toe, and footprints can also be used in identification, although records for them are notnearly as extensive. DNA traces, like fingerprints, are frequently left at an event scene,although collection can be significantly more difficult. Hair, blood, skin andbonesamplescanallyieldDNA traces,oftenevenafterextensivedecomposition (although fresh blood yields the best results). Even whenyou havenoovertsampleslike pools of blood,orskin underthevictimss fingernailsyou may still be able to capture microscopic hairand skin samples. Bedsheets and clothing are great sources for suchsamples. DNA records, however, are not nearly as complete as fingerprintrecords. Furthermore, DNA analysis is much more expensive and time-consuming, making it unsuitable for low-probability checks or eliminativeefforts. Dental records are used in identifying bodies. Ideally, the labneeds the subjects full dental history as well as the body or at least a castand x-rays of the teeth. However, it is sometimes possible to make atentative ID based only on good photographs of the subject taken beforeand after death (the photos must, of course, show the teethat least awide smile). There are no extensive dental databasesdental recordscan only be used to confirm a suspected identity. If you have no suspectedidentity to test, dental remains can give you the approximate age of thevictim, a solid estimate of race, and some aspects of personal habits andmedical history. Dental evidence can also match a given set of choppersto bite marks on food, pencils, or other people. Ballistics analysis yields information on the type of firearm used.The rifling marks on a bullet found on the scene will match those on a test-bullet fired from the same weapon in the lab, giving positive individualcharacteristics, and may yield class characteristics (make and model, ora limited range of them) of the firearm even if it is not recovered. Inaddition, powder residue in shell casings or on the victim may providetaggants if the ammunition was legally obtained, and shell casings canInvestigation Management 25Techniques 7: Detecting Concealed WeaponsConcealed weapons, especially concealed firearms, are commonly encountered in aBlackEagle operatives line of work. Its often critical to know whether someone is armedwhen you dont have the opportunity to search the subjector even when you dont wantthe subject to know that you suspect him or her of being armed.The first step is to know where to look. Concealed firearms are almost always kept inshoulder-holsters (on the side opposite the subjects primary hand) or the waistband(front or back), with the occasional weapon in an ankle-holster. On rare occasions,individuals will hide weapons in sleeve holsters, but these are generally ineffective andeasy to spot. Small handguns hidden in these locations are easily and effectivelyconcealed by loose clothing, but bravado often compels criminals or bodyguards to carrylarger, less concealable weapons. Look for bulges in these common locations, for placeswhere the clothing doesnt hang properly, or for the lines of holster straps under theclothing. Also note that all of these require covering clothingan individual who doesnttake off his jacket when everyone else does, or who is dressed more warmly or formallythan the situation requires, may be hiding something.Often, you wont be able to tell definitively whether someone is carrying a weapon, butif you are suspicious the next thing to observe is the subjects behavior. An inexperiencedsubject may favor one side, sit oddly, or uncon-sciously scratch at or fiddle with his or her holsteror weaponbut a pro wont give you any ofthose clues. So instead, position yourself sothat you can see the subjects hands. A con-cealed weaponis littlethreat ifit remainsconcealed; keeping an eye on the subjectshands will give you some warning beforethe weapon can be deployed. The samecanalsobesaidofthesubjects eyes (which willlikely begin sizing up thesituation and assessingtargets in the secondsbefore guns are drawn),andthepositioningtaken by individuals in agroup.oThe BlackEagle/BlackEagle Operatives Handbook 26identify a weapon individually or by class from marks left by the firing pin,extractor, breech face, chamber, or magazine. Tool marks are left wherever a tool is used as a weapon or inbreaking and entering. Class information can be gleaned from the marksleft behind, and individual characteristicsbased on microscopic scratchmarkscan be identified if the tool is recovered. Note that the scratchedmaterial must be removed from the event scene and brought to the labwhich isnt always possible if the scratches are on a permanent structure. Soil, glass, and paint can provide class characteristics, andoccasionally individual characteristics. Soil left on a victims or suspectsclothes, shoes, or vehicle tires and undercarriage can be matched withsoil type at the event scenebut soil is never more than a class identifier.Glass and paint are analyzed in the lab for chemical composition, yieldingprecise class matches. Reassembling broken glass shards can yieldindividual matches, while looking at paint layers can provide a very tightclass match. Cloth, fibers, and rope always provide class characteristics.Lab analysts look at fiber and strand count and thickness, twist, die colors,and weave patterns. Fabric weave patterns can leave impressions orprints on bodies or objects. Hair, blood, and excretions can be used not only to generateDNA traces, but also to provide clues in their own right. All three provideclasscharacteristicsaboutthephysicaltypeofthesubject.Iftheyoriginated from an animal, all can also be used to identify the specie. Documents can be examined for the source of the paper and theof writing, printing, or marks on the surface. Inks and toners can beidentified, as well as (often) the model printer or typewriter used toproduce the document. A glitch in the output from a typewriter or printerwill provide an individual characteristic if it can be duplicated. Otherwise,all characteristics will be of the class variety. A document can also beexamined for impressions left when someone writes on another sheet ofpaper on top of it. Computer enhancements can, for example, revealsomething written on a typical scratch pad from the impressions on a pageten or twelve sheets down. Photographs and video can be invaluablesometimes. Pic-tures are indeed worth a thousand words, and the right photograph canyield surprising results. Faces can be enhanced and identified, some-times even if they are unrecognizable to the naked eye. Unidentifiedobjects in the scene can be compared with identified items, yieldingprecise dimensions. Shadow angles can be measured to tell the seasonand time of day when the photo was shot. Details unnoticed by eyewit-nesseslike the brand of a vehicles tires (important if you found tracksat the scene)may be picked up on a photo. However, a photo cant helpyou if it doesnt have the information you needno matter how much youenhance it.Investigation Management 27Techniques 8: Knowing Illicit Drugs and their EffectsIllicit drugs and their users are often encountered in the course of assignments set inurban environments, or against traffickers or narco-terrorists. An understanding of thetypes of drugs commonly encountered, and the symptoms of their use, can be helpful. Afew of the most common drugs and their general symptoms are presented heretheseare by no means comprehensive, and the exact symptoms can vary from individual toindividual, and according to the dosage and variant of the drug:Drowsiness Excitation/Hyperactivity Restlessness/Irritability Anxiety Euphoria Depression Hallucinations Panic Irrational Behavior Confusion Talkativeness Rambling Speech Slurred Speech Laughter Trembling Staggering Impaired Coordination Dizziness Slow Reflexes Sweating Constricted Pupils Dilated Pupils Nausea/Vomiting oThe BlackEagle/BlackEagle Operatives Handbook 28 Soundprints and audio sources can also be enhanced. Voicescanbeidentified,andvoice-printanalysescanindicatewhetherarecordedspeakerislying,nervous,ordrugged.Gunshotsandcarengines can be analyzed to determine the model of the source, althoughthis is always a class identifier.Criminal RecordsCriminal records contain a great deal of cross-referenced information,and may be useful in identifying suspects even if you have few clues tostart with. Fingerprints or DNA samples are obvious file reference points,but you may be able to pull files from photographs, composite sketches,or MO (Modus Operandi).Criminal record searches, of course, rely on the perpetrator havinga criminal record. If the perpetrator has committed no past crimes, orhasnt been caught, a record search will not turn him upand in fact maygive false leads. Of course, a negative result is information in and of itself:it tells you that the suspect is an amateur, is talented enough to have neverbeen arrested (one need not be convicted to have fingerprints taken anda basic recordfile opened),orhastheresourcestoerase records(although the latter is extremely unlikely).The L&P criminal records databases maintained at the Atlanta andLondon L&P facilities are fairly comprehensive records on individualcriminals as well as criminal and terrorist organization. BlackEagle drawsthese databases from U.S. and E.C. federal sources, supplemented byInterpol and selected state and private records sources. Information in theL&P records is not as current as the sources from which it is drawn, butis generally accurate and may be sufficient for your needs. When yoursearch request is processed, the results will include the most recentrecord available, including a field indicating when it was last updated.If these records do not prove accurate enough, you may be able todo better. The most up-to-date criminal records are kept in state andfederal law-enforcement databases. These records are shared with anyand all other law-enforcement agencies as needed. If you have connec-tions with your local police, they can get database information from stateand federal records.InformantsInformants are individuals who, for any number of reasons, provide youwith direct or background information that applies to your investigation.Althoughinformantsmaybewitnessesalso,thetwodifferinthatInvestigation Management 29Techniques 9: Following up on Gang CrimesIf you investigate crimes in urban settings, sooner or later youll run into street gangs.Although theyre anarchistic, there are a number of patterns to gang crimeunderstand-ing them can give you direction when investigating a crime that you know or suspect mayhave been committed by a gang or gang members.Gangs generally commit three types of crime: burglary (especially car theft); mayhem(usually as part of an initiation or indoctrination process); and drug distribution. Gangsalso fight among themselvesthese fights sometimes result from sheer rivalry, but mostare related to drug turf and transactions.Burglary is the first stage of a gangsters career. Most gang thieves are aged thirteen tofifteenolder gangsters rarely participate, except as organizers or mentors. Theft is away of developing and proving ones skills before moving on to bigger things, and in mostgangs only car theft is pursued for real monetary gain (often in conjunction with chopshops: legitimate auto repair services that deal in stolen cars or parts on the side). Younggangster thieves never work alone (solitary pursuits are discouraged by the gang), butusually operate in groups of three to eight. One gangster commits the theft; the others actas lookouts and can help intimidate or attack victims. Gangs rarely burglarize their ownneighborhoods, but travel into other areas (often those of rival gangs) to rob stores andhomes and steal cars.Levels of mayhem vary from gang to gangsome participate in little beyond graffiti andpetty vandalism, while others require littles to commit violent crimeseven randommurdersbefore being fully initiated into the gang. Mayhem may or may not occur withina gangs home neighborhood. Because of their initiatory nature, most major mayhemcrimes are also committed by younger gang members.Drug dealing, on the other hand, is a more senior activity. Typically, a gangster servesas a runner or mule for a year or two, then moves up to becoming a street dealer. A runneroperates alone, carrying drugs from the senior distributors (or mainheads) in the gangto the street dealers, and carrying cash from sales back. Street dealers operate on opencorners or from crack houses, in groups of three or four. One individual sells, while theothers stand lookout or provide security. Often, the gangsters hide their drugs near theirsales site, and dont bring them out until the deal is concluded. If the police are spotted,the usual response is just to casually walk away, leaving the stash hidden. Dealers ofteninvite customers to partake of their wares on the spot before buying, in order to flush outundercover police officers.Gangs fight over sales turf, and additional members may be assigned to protect dealersat particularly popular street corners or locations. oThe BlackEagle/BlackEagle Operatives Handbook 30informants know more about the event or the perpetrator than what theywitnessed at the scene. They are insiders.There are many reasons why an informant chooses to talk with you.He or she may do it for money, or some other tangible benefit. Informingmay be a way to strike at competing criminal organizationsthis isespecially common in the gambling, fencing, and drug-running under-worlds. Spouses or love interests (or ex-spouses or love interests) mayinform out of jealousy or as a form of revenge. And of course, the informantmay simply think it an act of good citizenship.Cultivating informants can be difficult, but very rewarding. If you arelucky, you may run across a repeat informant in the normal course ofinvestigation. Generally, however, an informant will contact you after youbegin to question people and word of your investigation gets around.Deliberately seeking out an informant is often impossible, and you mayend up being fed misinformation. There are a few sources worth lookinginto,however.Criminalshopingtoreducetheirsentenceareoftencooperative in providing evidence, although you wont be in a position tobargain without the help of the prosecuting attorney. Convicts recentlyreleased from prison are another likely targetthey will often use theirunderworld knowledge for a source of income until they find another. Ofcourse, such an individual wont do you much good unless his or herbackground is related to your investigation.When trying to cultivate informants, start near the focus of theinvestigation. Remember that an informant is a sort of traitorsomeonedivulging privileged information. Look for someone who might have thatinformation, and a motive to share it. If your target is a business (licit orillicit), or an individual who runs a business, question the employees,looking for someone who may be dissatisfied with his position or holds agrudge against the organization. Seek out girlfriends, boyfriends, orspouses, or exs in any of those categories. Find out if the individual ororganization has any criminal associations, especially any that have beenarrested or convicted, and seek them out.Remain circumspect when seeking an informant. Remember thatcriminals hate few things like they hate informants. If they find out that youare looking for that kind of a source, they will compartmentalize theirinformation, making your investigation harder even if you cultivate adozen informants. They may even plant a false informant, a double-agentto derail your investigation. And theyll certainly put pressure on thosethey suspect of informing.For that reason, once youve developed an informant you must doeverything possible to protect his or her identity. If your target comes tosuspect your informant, his usefulnessand perhaps his very lifewillbe over. Avoid meeting the informant directly, and never see him or hersocially.Investigation Management 31Techniques 10: StakeoutsSurveillance can take two forms: stationary surveillance (stakeouts) intended to monitoractivity at a given location, and mobile surveillance (shadowing), intended to keep an eyeon a given individual and his activities. Both are labor-intensive and often downright dull,but require skill and attention. Its tempting to foist these jobs off on the least seniormember of your cell, but the major decisions on how and where to place surveillance, atleast, should be made by experienced operatives.Stakeouts are the easiest form of surveillance, because once a site is selected you needonly to wait and watch. Vigilance is required, however, especially in the face of boredom,and you must be discrete. Here are some points to consider when choosing a site: Conspicuousness is the single most important factor. If you are noticed by the subject,a neighbor, or even a well-intentioned cop, you jeopardize the surveillance and even theentire investigation. View. Can you see as much as possible, including avenues of approach? It doesnt domuch good to have a great view of the street and front door if the subject always uses theback door and rear alley. Also, check conditions for photography if you will be takingpictures or video. Access. Can you get in and out of your site easily, and without arousing suspicion? Ifyou need to respond or move in, can you do so quickly?If you are staking out your target for a short time, it may be sufficient to do it from a car,or even on foot. Choose a site that conforms to the criteria above. Park or stand on a sidestreet about half a block away. Never hang around right in front of the target building.Change personnel and locations every couple of hours, or right away if anything oranyone draws attention to you.If you will be watching for more than a day or two,rent a room or apartment nearby. This will giveyou a secure and private location fromwhich to work, as wellas the increased vis-ibility of height. Use awindow a floor up fromthe subject, if possible,andnotdirectlyacross. Again, makesure your site meetsthe above criteria.Either way, be discretein choosing your loca-tiontheperfectspotwont do you a bit of goodif you were too obvious inlooking for it.oThe BlackEagle/BlackEagle Operatives Handbook 32SurveillanceSurveillance is a time-consuming and basically boring task, and shouldbe left to the final stages of your investigation, when your suspicions arepretty solid and only need be confirmed. Use surveillance to look forsomething specificto catch a suspect in the act, get him to lead you toanother, or to monitor activity at a given location. You can use surveillancetolearnmoreaboutthesuspectsactivitiesingeneral,butitisaninefficient investigative tool if the purpose of the surveillance isnt fo-cussed.Your surveillance can take the form of a stationary stake-out (of aspecific locale), or a mobile one (of an individual). In either case, thebasicscamouflage, stealth, and common senseare paramount. Thesidebars on the previous and opposite pages outline specific surveillanceand shadowing techniques. What you most need to keep in mind whenusing any of these is that a suspicious target will notice anything odd inhis environment. For example, a stake-out in an ethnic neighborhood willdraw attention from the target (and others) if the investigators, seen goingin and out of the stakeout site, do not fit into the community. In short, usecommon sense, blend into the background, and remember that it isalmost always better to lose the subject for a while than to blow your coverand tip the subject to the investigation and your surveillance.Public Record SourcesWhen carrying out a background investigation on a person or organiza-tion, or looking into such a target as part of an event investigation, you canfind a great deal of information in public records. Using public records iseasy,free, and totally legal, andpublic records containvolumes ofinformation on every individual and organization in the country. Birth anddeathcertificates,marriageanddivorcerecords,deedsandhome-ownership records, incorporations, bankruptcies, and legal involvementsare all recorded at public record sites. Individuals. Information you can gather on an individual startswith his birth certificate, which will tell you his full name, age, and date andlocation of birth. Official records from the targets youth are likely to bescarce, but not so from his or her adult life. Court record searches will tellyou about any criminal charges the target faced, or any civil litigation inwhich he or she was involved. Marriage and divorce papers will berecorded, as will birth and death certificates for any children. If the targetowned any real estate, deed records will be available, which will includea description and approximate value of the property. Any applications forbuilding permits or rezoning will be recorded. If the target was involved inpolitics, either as an official or a concerned citizen, his involvement willInvestigation Management 33Techniques 11: ShadowingShadowing is far more difficult than conducting a stakeout, not just because of theincreased risk of exposure, but because it can be hard to keep up with an unpredictablesubject. Shadowing is always easier with more than one operative, because you canprepare for your subjects movements and shuffle different faces through the high-visibility position. Radio communications are a good idea with a multi-operative mobilesurveillance, especially when shadowing cars, but be discretenothing is more distinc-tive or revealing than a person talking into a radio mike.In general, shadowing only works if the subject doesnt know you are there. If he sees youfollowing, hell abort his original activity and try to shake you, and youll never get a chanceto see who he meets, where he goes, or what he does. If the subject thinks hes beingfollowed, he will pull a few tricks (see the Shaking Tails sidebar, on page 37). Its usuallybetter to let him go than to confirm his suspicions.Dont rely on disguises unless you are really good. Instead, remain inconspicuous. If youllbe on the tail for a long time, a change of hat, jacket, and/or tie should do the trickthesubject is much more likely to notice these things than your facial features. When on theroad, use an inconspicuous carmid-sized, middle-aged, in blue or earth-tone paint, andwith no vanity plates or bumper-stickers. Also, be prepared for contingencies. Thatmeans having a map handy, packing a little bit of food and carrying a decent amount ofcash and change (so you wont be stuck waiting for change if you have to follow the subjectinto a restaurant, and then buy something to avoid looking conspicuous). Hit the restroombefore you get started. And have some sort of storynothing elaborate, just somethingyou can say if confronted.When shadowing alone, hang back almost as far as you can without losing the subject.If he or she enters a store or restaurant, walk past, then find some discrete location fromwhich you can watch the front entrance, and, if possible, one side of the building. Thesubject may try to lose you by leaving via a rear exit. Following him through will confirmthat hes being shadowed, so its better to hang around outside and take the risk of losinghim. If the subject gets on a bus or other public transport, get on as well. Again, he maytry to lose you by getting right off, before the bus departs, and if you get off too your coverwill be blown. Instead, stay on, get off at the next stop, and board the next bus on the sameroute. Youll probably lose him, but if you blow your cover hes lost anyway. And he mayhave really intended to take the busin which case you will pick him up again when thenext bus comes.If you think your subject is on to you, play it cool. Stick to your cover, but leave the area.If the subject follows you (not unlikely if he wants to confirm his hunch), stay in public.Enter a shopping mall or a restaurant. Act natural, and dont let him follow you home orsee you doing anything that might tip your investigation. Dont use any deliberatetechniques to lose him, or hell know somethings up. Chances are (unless you reallyslipped up) that once his suspicions are allayed, hell go about his business. If you thinkhes seen your face, dont tail him again.oThe BlackEagle/BlackEagle Operatives Handbook 34show up in official meeting minutes. If the target is dead, there will be adeath certificate with place, time, and cause of death, and the countyprobate court will have his will on record. Businesses. Businesses leave official paper trails just like indi-viduals. Articles of incorporationthe birth certificate of a corporationare filed with the Secretary of State (state, not federal) and include thecompanys business purpose (although this may be stated very vaguely),its registered agent, and the address at which it receives its official (state)mail. The owners may or may not be listedif they arent, check otherdocuments, like deeds, permit applications, and litigation records, to seewho signed them or appeared in court to represent the company (such aperson may or may not be the owner, but will at least give you anotherlead). All of the same types of documents that apply to individualsmortgages, property records, building permits, etc., can exist for corpo-rations. Even dissolution papers (corporate death certificates) and bank-ruptcy filings are left on record.Sole proprietorships and partnerships are non-incorporated busi-nesses. Their records are simply the owners, but under different names.You should be able to obtain a copy of the trade name permit from theSecretary of State.Obtaining access to local records is very simplecounty records are keptat local courthouses and are open to public inspection during regularbusiness hours. In addition, most localities have transferred some or alloftheirfilestoelectronicdatabases,accessiblebyGenNet.Manymunicipalities, however, have not yet taken that step. If you are lookingfor records kept somewhere across the country, your choice may be along trip, or hiring some local organizationlike a trust company orprivate investigatorto search the records for you.In addition to government records, there are a handful of recordsources maintained by private organizations but available to the public.Phone books and neighborhood directories list physical and GenNetaddresses, as well as phone numbers. A number of directories availableonline or on CD-ROM list addresses by street and neighborhood, cross-referencing each address with the residents name, spouse, and occupa-tion.Followingalistingthroughseveralofthepublicationsannualvolumescandeveloparoughmarital,employment,andresidentialhistory of the target. The directories, however, are not one-hundred-percent accurate, cover only select urban areas of the U.S., and generallystick to residential neighborhoods. For information on businesses, espe-cially big businesses, look into S&P or Moodys reports on publicly-tradedcorporations, or any of the several library search services that containabbreviated information on businesses all over the world. All of thesesources contain addresses and phone numbers, a basic description ofthe companys business, and perhaps the names of corporate officers,Investigation Management 35Techniques 12: the ABC Shadowing MethodThere are several techniques for multi-person shadowing. The best requires threepeople, and is known as the ABC technique. Two people follow the subject (the nearthe trail positions, labelled A and B in these illustrations), while a third parallels fromacross the street (the parallel position, labelled C). You can shuffle the positions of thethree as you maneuver through the streets, keeping a fresh face near the subject. Sincea shadower is more likely to be noticed following around a corner than simply walkingdown the street, corners are good places to trade off positions. The two techniques hereshow how to inconspicuously shuffle yourpeople, while never breaking contact withthe subject.In this first illustration, the subject turns butdoesnotcross thestreet. TheA mancontinues straight, crossing the street, thenturns and takes up the C position. Mean-while, the trail, or B man, moves up behindthe subject. The C man crosses at thecorner and takes up the trail position.In the illustration to the right, the subjectturns and crosses the street. The A andB men stay in position, while the C mancontinues straight, then turns on the far sideofthecross-street.Inthisway,nobodydraws attention to themselves by changingstride, although you do not get the opportu-nity to shuffle positions.If your subject tries one of the tricks men-tioned in the previous sidebar, the nearfollower (the A man in the illustrations) can nonchalantly walk on, to watch from adistance, while one of the others follows into a store or onto a bus. If the A man is spotted,remove him from the lineup and continue the surveillance with your remaining operatives,or bring in someone else.This ABC technique works well with vehicles, too. The C car can parallel a block away,if the street layout allows it. Radio communications, however, are critical for multi-vehicular surveillance.oThe BlackEagle/BlackEagle Operatives Handbook 36directors, and major stockholders. All of the above-mentioned sourcesare commonly available at libraries, or through online information/libraryservices. Also worth looking into are newspaper archives, most of whichare not online, or at best only have the last few years worth availableelectronically. All, however, are well-indexed, so if your subject has everbeen in the public eye you should be able to read about it with a few hoursresearch.Private and Restricted-Access Record SourcesIf individuals and businesses leave a large trail of public-access records,the trail of private and restricted records is enormous. Tax records,spending habits, credit reports, bank balances, employment data andcriminal activities are all recorded in databanks kept by private organiza-tions or by government agencies that do not make them public. Here area few of the dozens of information sources available commercially orthrough contacts: Drivers license records are kept by each states Department ofMotor Vehicles or equivalent, which is usually part of the state revenueagency. Information includes address, weight and height (all three ofwhich may not be up to date), date of birth, hair and eye color, vision-correction requirement, license expiration date, suspension notices, andmaybe Social Security number. The record may or may not be availableby formal written request, depending on the policies of the state inquestion. If not, a contact in the local police department, DMV office,county tax assessors office, or Secretary of States office may be able tohelp you. The data is also online, although restricted. Credit bureaus keep tabs on the credit status of virtually everyadultinthecountry. Theinformationincludescredithistory,currentincome and credit sources, current balances on credit cards and othercredit sources, monthly payments, and account numbers, as well assupplementary information including current address, known previousaddresses, employment, birthdate, and Social Security number. Theinformation is provided, for a fee, to legitimate businesses consideringextending credit to the subject. Since BlackEagle is one such business,you can have your L&P coordinator pull a credit record for you. Keep inmind, however, that the data kept on major criminals and other importantor wealthy people may be whitewashed. Banks and financial institutions are notoriously discretewhen dealing with the public. When dealing with one another, however,they are not so cautious. A polite letter of inquiry implying that yourepresent another financial institution will often be answered with softinformation on banking habits and balances. Generally, the data willinclude account numbers and coded information that translates to ballparkInvestigation Management 37Techniques 13: Shaking TailsThere are several techniques you can use to shake a tail, or force him to reveal himself.A few are discussed here, so you can look out for them or use them yourself, if you thinkyou are being followed. In all of these cases, the subject is likely to notice the tail man,but probably wont notice the B or C men unless heis both perceptive and skilled. Therefor, you may beable to switch a new person into the tail position andmaintain the surveillance, even if one member ofyour group has been spotted.A reverse is the most basic tail-shaking maneuver.It forces the tail to either let you go or turn aroundand follow you, which is extremely obvious. Ifyour subject suddenly reverses direction, walkpast and keep on walking. Then, if you are solo,try to pick him up again after circling the block.But be carefulthe subject will try to get a lookat your face as you pass him. If youre workingwith a team, split up, circle the block, and pick upthe subject with someone else in the A posi-tion.If you are being followed, a reverse is a good way to flush the tail and, as mentioned, geta look at his or her face. A reverse will give away your suspicion, however, so if you dontwant the tail to know youre on to him, try the next technique.A less reliable method takes advantage of blind corners. The subject turns the corner,then stops just out of sight. Even an experienced operative finds it difficult not to hesitateor look surprised when he comes around a cornerand almost runs right into his subject. The onlydefense is preparation. Whenever your subjectdisappears around a corner, be prepared to lookextra nonchalant as you follow. If you bumpinto anyone, mumble an apology and con-tinue on, even if that means passing thesubject. Once again, the subject will prob-ably get a good look at your face.Another good method, for foot or vehicularshadowing, is to speed up or slow down alittle above or below the ambient trafficspeed. Notice if anyone else seems to bedoing the same, and if so, switch to theother extreme. If they also change speeds,you know you have a tail. The best way tocombat this as a shadower is to be flexible with the distance between you and the subject.If he speeds up, let the distance grow, then gradually recover it. If he slows down, overtakehim a bit, then fall back slowly.oThe BlackEagle/BlackEagle Operatives Handbook 38figures on average balances and levels of activitynot actual balancesor other exact numbers. You may be able to get this same informationfrom bank databases or connections in bank offices. If you already haveaccount numbers and are willing to impersonate the target, many banksand credit card agencies have over-the-phone services that will give youcurrent balances and even allow you to make changes in service. Freedom of Information Act requests can be used to dig upgovernment files on virtually any subject. Call the public liaison or FOIofficer of any agency that might have the records you want and requesteverything on your topic. With any luck, they will send you the recordswithin a couple of weeks. If not, write a formal request to the same person,sending it by certified mail. The agency is required by law to respondwithin ten days, sending you the requested records unless they fall underspecific national security or privacy act guidelines.As mentioned above, many of these sources are only loosely restricted.Much of this information is available for approved uses, or to specificagencies, businesses, or individuals (particularly the subject). A mildly-deceptive phone call is sometimes all that it takes to access many of theseinformation sources, especially if you already have basic information onthe subject, such as full name, account numbers, or Social Securitynumber.Other LeadsThere are infinite numbers of other possible leads, depending on thenatureandspecificcircumstancesofyourinvestigation. Afewarecovered here: Stolen property. Thefts of mundane items do the criminal nogood if he or she cannot offload them. If you are dealing with mundanethefts, check out local pawn, resale, and second-hand shops to see if youcan locate the goods. Contrary to myth, most shop-owners are verycooperative in this regard. You must, however, be able to positively ID anymissing merchandise. Get serial numbers from the victim (if he doesnthave them, try the store where the goods were originally purchasedretailers usually keep good records of major item sales). Also check withmerchants, repair shops, and pawn brokers that may have previouslyhandled the merchandisemany will leave hidden marks that a thief willbeunabletofindorremove.Onceyouidentifyapieceofstolenmerchandise, the stores records and the owners memory should pro-vide leads on the thiefs ID. Hospitals. If a perpetrator was wounded in the act, check withlocal emergency rooms where he may have sought treatment. Most arerequired to report shootings and stabbings to local authorities, and evenInvestigation Management 39Techniques 14: Conducting InterrogationsInterrogation differs from the simple questioning of witnesses or informants in that theinterrogator is seeking specific information that the subject is concealing. Interrogation isa tricky proposition: done well, it can quickly advance an assignments; done poorly, it canreally set you back. When interrogating a prisoner or hostile suspect, keep in mind all ofthe tips discussed in the Informants and Witnesses sidebar earlier in this book (see page19). Also keep in mind that most effective interrogation techniques dont yield legally-admissable results when carried out by civilians, and are legally risky at best in manycircumstances.As mentioned in the Informants and Witnesses section, plan your interrogation. Knowwhat information youre after, and what your subject can likely provide.Start your interrogation process by building the proper environment. Create an environ-ment that is neutral, private, and isolatedone that avoids distractions, deprives thesubject of any interaction except with the questioner, and forces a feeling of isolation andhelplessness on the subject. Dont let anyone but questioner talk to subject, even othermembers of your cell. Search the subject, and examine anything found on himevenitems that arent of immediate informational value can provide you clues about thesubjects background and perhaps verification of what he says.As you start your interrogation, ask direct, simple questions. Keep your manner neutralor even a bit naiveallow the subject to underestimate you. Later, when you have a senseof how your subject responds, you can build towards more sophisticated techniques. Avaguely uncomfortable subject is easy to keep off-guard. If its chilly, keep him half-naked,while you dress warmly. If hes hungry, eat in front of him. If he smokes, deny him tobaccowhile you smoke.Ask your questions quickly, so that the subject cant fabricate a story. Follow up vagueanswers with questions that elicit details (which are harder to make up quickly). When oneline of questioning is finished, quickly change to a new topic to throw the subject offbalance. If you can verify any facts while the interrogation is ongoing, do soand let thesubject know that you are.You want to bully and intimidate the subject as necessary, but you also want to make iteasy for him to speak. An excellent method is the good-cop, bad-cop trick: work with twoquestioners, one who bullies and threatens the subject, and another who is sympathetic,who holds back the bully, who acts as the voice of reason in the face of an overly-aggressive partner.Another old tip when dealing with a lying subject is to plant false evidence in his storythe location trick. If the subject claims to have b