Underground Trade-Craft - An Introductory Discussion
Underground Trade-Craft - An Introductory Discussion
Underground Trade-Craft - An Introductory Discussion
August 5, 2013
Preparedness advocates, whether they label themselves “survivalists” or “preppers,” fall along a
wide spectrum of intensity and preparations, ranging from a total cataclysmic breakdown in the
social fabric that will result in a Mad Max-type of tribalism, to those who look to previous socio-
economic collapses, such as that suffered by Argentina in the last decade, where crime and violence
and discomfort was certainly prevalent, but there was still some semblance of a social order (“Why,
no James, actually, you cannot go out and kill all the people who looked askance at you in grade
school!”).
Barring a complete tearing asunder of the social fabric, a la Cormac McCarthy’s “The Road,” which
while possible, most learned observers agree is unlikely, one aspect of security preparedness that
has to be dealt with is the development of training and planning to deal with attacks that are less
than the Cannibalistic San Franciscan hordes storming the walls of your survival retreat-cum castle.
As the train falls further off the tracks, and law enforcement and government find themselves more
and more irrelevant in people’s daily lives, people will increasingly find themselves more subject to
threats ranging from “simple” robbery and home invasion, to unlawful detention (what we used to
call simply “kidnapping”…..), or even outright murder and assassination. Additionally, there are
those within the patriot movement of course, who firmly believe that they are subject to those types
of attacks from the regime itself as well.
I’ve often been chastised by readers with no experience and resultant comprehension, for seeming
to focus this blog on traditional field-craft, rather than focusing the development of skills specific to
application in built-up areas. They are correct, but that lack of experience and training prevents
themit from understanding the reasons behind that focus. If you can conduct operations successfully
in rural/wilderness areas, you can conduct operations successfully in urban/built-up areas with only
minor changes to specific TTPs. At the same time, if you cannot conduct operations successfully in
rural/wilderness areas, you’re going to find yourself fucked in the ass when you try and perform in
urban/built-up areas.
The two U.S. military units that are tasked most often with the conduct of clandestine or covert
special operations in urban areas, CAG and DEVGRU, do not recruit off the street, regardless of the
comic-book fantasies of some people. Even the Special Activities Division of the CIA prefers to
recruit former military special operations personnel. This is for one very sound reason: those
candidates already possess experience and a mental framework for the conduct of operations
developed through the conduct of traditional small-unit combat operations in traditional field
environments.
The truth is, with very few exceptions (and most of those were prior service), I’ve seen very few
participants in classes who came into it with even a basic grasp of the subject matter that wasn’t flat
wrong. It’s not something you can pick up from reading a couple of old field manuals. Urban trade-
craft, further, is not something that you just “pick up” although like the farm kid/hunter who picks
up a trick here and there that makes traditional field-craft “easier” to grasp, the urban dweller may
find elements of urban trade-craft intuitively make sense, based on his life experiences.
Nevertheless, a solid grasp of understanding regarding the nature of urban trade-craft is absolutely
critical, including the hostile planning cycle, types and methods of surveillance and counter-
surveillance methods, and more.
From simple robbery and home invasions to kidnapping, carjacking, and bombings, to outright
murder/assassination, during a breakdown in the social order, it is important, when discussing the
methods of countering these threats, that we understand the planning and preparation processes
behind them, in order to interdict such operations as early in the process as possible. Going to guns
to elude exploitation by the bad guys, should he your last resort, especially with limited medical
care, and when the bad people have more people and bigger guns.
Fortunately, studies of attacks throughout modern history, ranging from international terrorist
groups, cartels, common criminal enterprise groups, and even formally trained government
agencies, have illustrated that successful attacks are generally executed by groups and organizations
who are “professional” in their planning and execution, and that “professionals” share common
traits in the planning and execution of certain types of operations. Recognition of the existence of
these patterns, as well as methods of interdicting the cycle of patterns, is the critical element in
urban trade-craft, just as it is in traditional field-craft operations.
Understanding the planning and execution processes used will assist you in not only recognizing
patterns of behavior that have the potential to influence you in a negative manner; they also allow
you to utilize that recognition in order to interdict the enemy’s activities unexpectedly, thereby
getting “inside his OODA Cycle,” and putting the odds more in your favor.
Initial Surveillance
Initial surveillance is used to gather information about a potential target’s habits over time,
including their common practices and routines, where they live, work, and play, and how they get to
those places and when. It is also used to attempt to determine what security measures they have in
place, if any. This helps narrow the preliminary potential target list into realistic target lists of
subjects that can be effectively attacked at minimal risk of loss. It is critically important to realize
that simply getting yourself placed on a preliminary target list, whether by a terrorist group,
criminal cartel, or regime agency, is not enough to result in your being targeted for attack.
Webster’s Dictionary defines surveillance as, “surreptitious close watch kept over someone or
something. More specific to our applications, surveillance is systematic, generally discreet,
observaton of a subject, in order to develop detailed information about that subject’s activities
and/or routines.
The objective of initial surveillance is to gather or develop detailed information on a person,
location, or facility that has been identified as a potential target of an organization or group, that
cannot be obtained through other sources.
We need to thoroughly understand the fundamental concepts and TTPs underlying physical
surveillance of a target. Within your life, a surveillance operation could be targeted on a person,
whether yourself, a family member or preparedness group member, the vehicles operated by any of
those people, or the home, office, or retreat locations of those people. Rather than focus on the
practice of active surveillance (although that’s obviously a pretty crucial skill set in itself), we
need to focus on how to utilize our knowledge of surveillance in order to identify hostile
surveillance of ourselves and/or family members and friends. Through a solid grasp of
understanding of surveillance TTPs and suitable counter-measures, we can more effectively counter
those surveillance attempts, and thus maximize our ability to live and function independently,
without interference.
Surveillance in the initial surveillance phase of the hostile planning cycle is concerned with
identifying which potential targets can successfully be attacked. It concentrates on learning the
routines and habits of the identified subjects, determining routes traveled, and evaluating the
security measures practiced (or not practiced in most cases), by the subject. The goal is to
determine if vulnerabilities exist that can be exploited (and they always do. It doesn’t matter how
tough you are, or how perfect your security plan is).
Fortunately, the initial surveillance phase is also the weakest link in the hostile planning phase for
most organizations. The individuals tasked to conduct initial surveillance will generally be new
personnel or even outside contracted individuals who may or may not be well versed in surveillance
trade-craft. Even well-trained surveillance operatives however, place themselves at risk of
compromise initially, due to the time necessary to learn about the area they will be conducting
surveillance in.
Surveillance operations, specifically in the initial surveillance phase, can be broadly divided into
two separate steps. The first is general area familiarization, while the second is specific target study
and pattern analysis.
General area familiarization is conducted prior to the commencement of surveillance on a specific
target. Operatives will study the general area surrounding where the surveillance operation will be
conducted. This is the trade-craft equivalent of conducting a map reconnaissance in traditional
operations. It is conducted in order to gather the basic background information needed for the
specific target study. It is used to determine the general activity patterns of the local civilian
population, including common dress and mannerisms of behavior, vehicle types and usage patterns
in the area, and the availability of local-type transportation assets. Potential specific target study
surveillance positions will also be identified during area familiarization.
Arguably, the simplest way to counter effective surveillance of your activities is to interdict the
general area familiarization phase successfully. While some would argue that living in a large, well-
populated area of an ethnic urban enclave, with the proverbial local neighborhood busybodies
present who notice everyone and quickly pass the word around about strangers in the area, is the
surest way to avoid or counter a surveillance effort, that’s not necessarily true. First off, living in a
close-knit suburban-type area can provide many of the same benefits. Second, the densely-
populated urban enclave offers far more hiding places for a surveillance team, and even in the most
“isolated” urban areas, there are always enough outsiders passing through at any given moment, day
and night, that it becomes relatively easier for the surveillance effort to hide themselves in plain
sight, through the use of local appearances in their mannerisms, dress, and accouterments, such as
their vehicle selection. Further, it can be difficult for an outsider to make inroads into the urban
culture to the point where the natives and old-timers will consider you a fellow local.
Living in a rural, sparsely populated are, where everyone knows everyone, and strangers are easily
identified, even at a distance, can provide many of the same benefits as living in the urban enclave.
In this latter case however, you also have to have been accepted as a local, in order to be a recipient
of the benefits of the “bush telegraph.” I’ve lived in rural areas where this took a minimum of three
generations, and I’ve lived in rural areas where 5-10 years was adequate, as long as you “proved”
yourself by being a good neighbor, with shared interests, and a willingness to work hard and help
out your neighbors. On the other hand, the sparse population in rural areas can make the facilitation
of fixed surveillance positions and hide-sites far simpler than in urban areas, with far less chance of
compromise (unless, you know…you conduct security patrols….crazy fucking shit, huh?)
Ultimately, there is no ideal location. It is a matter of developing the community and networks to
expose outsiders who are acting peculiarly. As with everything in UW, it really does fall back to
building community and not pissing off the local civilian population, if you want to survive.
Specific target study, including pattern analysis, is what most novices think of when they consider
surveillance as an aspect of trade-craft. It is conducted in an attempt to determine the target’s
personal habits and routines, such as modes of transportation, routes of travel, including regular
arrival and departure times and patterns, as well as overall apparent security awareness and
discipline, as well as any specific security procedures that seem to be in place. The hostile
organization will use the information gathered in this phase to help determine if the preliminary
target is a legitimate and executable target or not.
While interdicting the general area familiarization is probably the surest way to stop a hostile
surveillance effort, since they never get the opportunity to get close enough to you to conduct
specific target study, the reality is, the specific target study phase of the initial surveillance is the
simplest place to interdict hostile surveillance, because it is the aspect that you have direct control
over. Through the use of observation, random travel patterns and irregular scheduling, as well as the
presence of a robust passive and active security effort, you have the option of creating the
impression of a target too hard to bother with in the hostile organization’s cost-benefit analysis.
Surveillance can be broadly categorized into either discreet or close-type surveillance. In the initial
surveillance phase, a well-trained surveillance team will generally limit itself to discreet
surveillance. This is the type of surveillance used to observe the target’s activities clandestinely or
covertly. If it seems that the surveillance will be compromised, in a discreet surveillance operation,
the operatives will terminate or break off their surveillance temporarily (this of course, leads
novices to the false impression that if they can make the surveillance team believe they have been
compromised, they will leave, and all will be well. On the contrary, this may make you appear a
more attractive target, or at least, worthy of more in-depth study. The only thing the surveillance
team has to do, is make themselves more difficult to notice….). Discsreet surveillance will often be
used by terrorists or governmental organizations, in order to aid in target selection and
identification, without risking the compromise of an anticipated follow-on operation. If it looks as if
the operation is going to be compromised, breaking off surveillance temporarily is the sensible
thing to do, in order to allow for a future resumption of surveillance without compromise, as noted
above.
Close surveillance is the type of surveillance often used by law enforcement agencies against
known criminal actors, as much as a deterrent to potential criminal activity, as to gather useful
intelligence information (sort of a “pre-crime” sort of thing….). It is sometimes described as a
harassing, smothering type of surveillance action. In the initial stages, the surveillance team may
even be discreet, and attempt to observe the target without compromise. However, the ultimate
purpose of this type of surveillance is to keep the target under surveillance, no matter what, so if
necessary, the surveillance team will allow its presence to be revealed to the target. While this type
of surveillance can be much harder to evade, since they don’t care if they have to squeal tires and
race through stoplights, it also poses benefits to the target. If you simply behave perfectly, then the
surveillance team never gets to gather any real information on you.
Whether discreet or close-type surveillance, the methods may include mobile, fixed point (or
“stationary” or “static”) surveillance, either of which may be enhanced with technical or
photographic methods of surveillance. Mobile surveillance is what most novices think of when they
think of surveillance. It is the method used when the target travels, and may be conducted on foot,
or utilize any type of vehicle, based on METT-TC, ranging from automobiles and motorcycles, to
public transportation, helicopters or fixed-wing aircraft, or that great bogeyman of the Patriot
Movement, UAVs.
Fixed-point, or static surveillance is generally thought of as being largely a rural-based method of
surveillance, with the establishment of hide-sites in over-watch positions. While that is certainly one
method of static surveillance, static surveillance posts can also be established in urban areas, in the
vicinity of a target’s home, workplace, or other locations frequented by the target on a regular bases,
including restaurants, bars, churches, gyms, etc. Additionally, static surveillance may be established
along a portion of a travel route the subject uses regularly, in order to help determine time schedules
used, or to enable mobile surveillance teams to “pick-up” a target, without them having to sit in an
exposed position waiting for the target to leave a given location.
Operatives conducting static surveillance will typically attempt to establish some sort of a cover for
their presence, in order to allow them to remain in a fixed position and conduct their surveillance
without arousing undesirable attention from the local population (and no, Joe Friday, sitting in a
car, with the heat running, when it’s snowing outside, is not fooling anyone…). This cover may
range, in the short-term, from simply sitting on a park bench apparently engrossed in a book or
conversation, standing and talking on a cell-phone, or sitting in a bar or restaurant, lingering over a
meal, to more elaborate, longer-term options ranging from having an operative gain employment in
the vicinity, to establishing a cover business or residence in the area where the surveillance will
occur. Elaborate covers are difficult to establish and expensive to maintain, making their use for
initial surveillance efforts practical only if the hostile organization has already limited its list due to
mission parameters.
Technical surveillance is accomplished through the use of equipment to enhance a surveillance
operation. From video recording systems and intrusion detection alarm systems to aid in
establishing the patterns of a target coming and going from a set place, to radio-frequency
transmitters as vehicle-tracking devices; from electronic eavesdropping devices built into cell
phones, to programs like key-loggers installed into computers, technical surveillance can be
extremely difficult to detect, and almost always requires similarly technical countermeasures to
locate and defeat.
Photographic surveillance is conducted using video or still photographic recording cameras, and is
used to record and document the results of the physical surveillance methods. While any
surveillance method can be used in conjunction with others, the last two types are, by definition,
limited to use along with mobile or static physical surveillance.
Surveillance techniques are most simply categorized into rotating surveillance and progressive
surveillance. Rotating surveillance is conducted using a relatively limited manpower pool. It utilizes
multiple people to follow the target while in transit, and operatives rotate their position relative to
the target, hoping to provide the target with too many new faces to successfully recognize potential
threats. This is the surveillance technique most commonly seen in cinematic and literary
representation, because it’s the simplest of the two to counter. An individual with a good memory
for faces, awareness of his surroundings, and a solid grasp of the dynamics of the local
demographics, aided with even a modicum of basic counter-surveillance training, will “make” his
tails with relative ease (not the same thing as saying it will be “easy.”). Countering rotating-type
surveillance is where the training in trade-craft and counter-surveillance really comes into play, as
you find yourself trying to remember the circumstances under which you last saw the familiar-
looking face that just appeared at the newsstand in front of you, or that Buick with the scraped
fender that is sitting at the intersection to your left.
Progressive surveillance is the phased coverage of a target. This technique uses multiple
surveillance teams, each providing coverage of the target from Point A (“origin,” when the target
enters their area of responsibility) to Point B (“termination,” when the target leaves their area of
responsibility). The next phase of surveillance will be begin as the follow-on team, already in place,
picks up coverage from Point B (their Point A) to Point C (their Point B). Subsequent follow-on
teams will follow the same process. This process repeats until the surveillance operation has
acquired the target’s entire route of travel. The use of multiple teams consisting of multiple
operatives makes this the more difficult surveillance technique to detect and counter, at least in
theory.
In reality, limited manpower and budgetary restraints, whether the hostile organization is a criminal
cartel, terrorist organization, or government agency, means that most surveillance efforts will be a
combination of rotating and progressive surveillance, with teams rotating along the progressive
surveillance route.