Key Takeaways
1. Cultivate Spy Sense: Mindset & Core Traits
Even though we have the absolute best training available, none of it really matters if you don’t have the right mind-set.
Mindset is paramount. Success in espionage, and life, hinges on the right mental approach, not just training. Spies need unwavering faith in their mission and their ability to adapt to unforeseen challenges. This internal conviction drives them to overcome obstacles and complete objectives, no matter how extreme.
Essential spy traits. Beyond mindset, key traits include empathy, the ability to conceal fear, and being social. Empathy helps build rapport and understand vulnerabilities, while hiding fear prevents giving adversaries an advantage. Being likable and a team player is crucial for recruiting assets and collaborating effectively.
Manipulation is a tool. Spies understand that manipulation is necessary to achieve objectives, distinct from mere persuasion. It involves getting someone to act in your interest while believing it's their own desire. This requires getting inside their head, identifying motivations (like money, status, or philosophy), and using them strategically.
2. Master the Art of Recruitment: Spotting & Developing Assets
I know I’m developing someone properly when he feels I’m the only person in the world who truly understands him, and that’s when he’s ready to be officially recruited.
Recruitment is sales. At its core, recruiting foreign assets is a sales process, selling "treason" in exchange for compensation or other benefits. The cycle involves spotting individuals with access to valuable information, assessing their suitability and risks, developing a relationship, and finally, recruiting them as witting agents.
Spotting potential assets. The primary criterion for a potential asset is access – connection to information or technology the government needs. Beyond access, case officers look for vulnerabilities (financial issues, revenge, excitement, desire for education/visas) that can be leveraged during development. Academics, researchers, and those with high-level relationships are often targets.
Developing the relationship. Building deep rapport is critical; the asset must feel genuinely understood and cared for, not just used. This involves exploiting vulnerabilities subtly, showing interest in their life and work, and creating a sense of obligation (e.g., buying expensive meals, helping family). The goal is a genuine connection that makes the asset comfortable sharing secrets.
3. Communicate Covertly: Signals & Dead Drops
Until you actually do it, many people can’t conceptualize a brush pass, a dead drop, or how to use signals or a concealment device.
Simple signals work. Spies often rely on simple, pre-arranged signals to communicate covertly when electronic means are too risky. These can be anything inconspicuous in the environment, like a thumbtack on a bench or a chalk mark, visible only to those looking for it. Consistency and clear pre-planning are essential for these signals to be effective.
Dead drops for exchange. A dead drop is a method for exchanging items (messages, money, tools) using a predetermined location and a concealment device. The device must blend in but be easily locatable by the intended recipient without drawing attention. Examples range from simple boxes to cleverly disguised items like corncobs or empty containers.
Brush passes for physical transfer. When items must be passed directly, a brush pass is used in a crowded area. Two operatives, often holding identical items (newspapers, briefcases), brush past each other, swapping the items containing the secret information. This requires practice to look natural and avoid detection.
4. Evade Surveillance: Run a Pro SDR
All it takes is one careless move to ruin an operation and get someone killed.
Assume you're watched. Spies operate under the constant assumption they are targets for surveillance, especially in hostile environments. Running a Surveillance Detection Route (SDR) before and after meetings or sensitive actions is mandatory to confirm if they are being followed and by whom.
Elements of a good SDR. A well-planned SDR is designed in advance with multiple routes, incorporating opportunities to observe followers without appearing suspicious. Tactics include:
- Parallel movement: Walking routes parallel to the most direct path.
- Turns: Using turns into shops or side streets to check behind you.
- Stops: Pausing at cafes or shops to see who enters after you.
- Channeling: Using narrow passages to force followers into a visible line.
- Reversals: Turning around (e.g., on an escalator) to observe who reacts.
- Dry cleaning: Entering a building with multiple exits to lose followers.
Vigilance is key. SDRs require patience, self-discipline, and constant observation. The goal is to bore potential followers into complacency or confirm their presence so you can take countermeasures. A single mistake can compromise the mission and endanger lives.
5. Elicit Information: Get Anyone to Talk
The ability to manipulate a person, to get him to do what you want while thinking it’s actually what he wants, makes the difference between succeeding and not succeeding.
Elicitation is subtle. This is the art of guiding a conversation to extract valuable information without the other person realizing they are divulging secrets. It's a core skill for spies, but also used (sometimes nefariously) in business and by criminals. Awareness of these techniques helps protect you.
Common elicitation techniques:
- Playing dumb: Acting ignorant to prompt others to explain and share knowledge.
- Flattery: Praising someone's expertise to encourage them to elaborate.
- Common interests: Bonding over shared hobbies to build trust and open communication channels.
- False statements: Making an incorrect assertion to provoke a correction with accurate information.
- Good listener: Being attentive and validating to encourage someone to open up about sensitive topics.
- Word repetition: Repeating a phrase the person just used to prompt them to expand on it.
Protecting yourself. If you suspect someone is trying to elicit information, be cautious. You can deflect by saying "I don't know," asking a question back ("Why do you ask?"), giving vague answers, referring them to public sources, or changing the topic. Avoid the urge to correct false statements or overshare based on shared interests.
6. Survive Physical Threats: Explosions & Kidnapping
If someone gets you into a vehicle against your will, there’s a good chance that you’ll be killed.
Explosion survival tactics. In the event of a bombing, immediate actions can save your life. Hit the ground and stay low to avoid shrapnel, and take slow, shallow breaths to protect your lungs from blast pressure. After the initial blast, assume there will be more and use the "zero, five, and twenty-five" technique to check your immediate surroundings for secondary devices before moving.
Kidnapping survival. The abduction phase is highly dangerous; fight and make noise if you believe you can escape, but comply if resistance is futile. Once taken, remain calm, observe details about your captors and location, and participate in your own rescue by leaving a DNA trail (spit, hair, blood) in unusual places your family can alert authorities to look for.
Managing captivity. Build rapport with your captors to be seen as human, not an object. Identify the "weak link" – the most sensitive individual – who might assist you or show leniency. Establish a fake, persistent health problem early on (like abdominal pain) that can be used during a rescue to signal your position and ensure you stay low and visible to rescuers.
7. Travel Safely: Awareness & Preparation
Making a connection with everyone from the concierge and the maid to the waiters and shopkeepers can make a huge difference if you are overseas during an emergency.
Build local relationships. Spies prioritize building rapport with locals everywhere they travel, from hotel staff to shopkeepers. These relationships provide valuable insights into the environment and can lead to crucial warnings or assistance during unexpected events or emergencies. Supporting the local economy by frequenting local establishments also helps you blend in.
Blend into the culture. Learn local customs and practice them sincerely. Avoid looking or acting like a typical tourist, especially in areas where Westerners might be targets. Pay attention to how locals interact and adapt your behavior accordingly. A genuine "custom-made smile" and using people's names can foster immediate trust.
Carry essential gear. A simple travel kit can significantly increase your safety during emergencies like fires or attacks. Key items include:
- Flashlight: For visibility in darkness or smoke.
- P100 Mask: Filters out toxins and debris.
- Safety Goggles: Protects eyes from smoke and dust.
- Rigger's Belt/Paracord/Carabiner: For emergency rappelling or keeping family connected.
- Bright Rain Ponchos: Helps keep track of family members in crowds.
- Multitool: For cutting or prying.
- Antibiotics: For potential medical needs when access is limited.
8. Protect Your Digital Life: Avoid Hacking & Scams
Email was never meant to be secure.
Treat email as public. Never email sensitive information like Social Security numbers, bank details, or confidential business data unless it is encrypted. Assume anything you send via email could potentially become public.
Strengthen passwords. Use strong, unique passwords for all accounts, especially financial ones. Passwords should be at least 12-14 characters, mixing upper/lowercase letters, numbers, and symbols. Change them regularly and avoid using personal information or obvious substitutions. Consider using a password manager or writing them down and storing them securely offline.
Be cautious with public Wi-Fi. Public Wi-Fi is often unsecured and vulnerable to "man-in-the-middle" attacks where hackers can intercept your data. Avoid using free, open connections (potential "rogue hot spots"). Always use a Virtual Private Network (VPN) when connecting to public Wi-Fi to encrypt your traffic and protect your information.
Beware of scams. Be vigilant against phishing (emails from fake credible sources) and spearphishing (targeted personal attacks). Do not click on suspicious links or attachments, even if they seem to come from someone you know. Delete emails requesting personal information. Be aware that social engineering can be used online to trick you into revealing sensitive data.
9. Be Resourceful & Flexible: Adapt to Anything
Beat it to fit, and paint it to match.
Embrace improvisation. The spy motto "Beat it to fit, and paint it to match" highlights the reality that plans rarely go perfectly. Spies must be highly resourceful, using whatever is available to solve problems on the fly and adapt to unexpected situations. This means being comfortable with uncertainty and trusting your ability to figure things out.
Flexibility is survival. Rigid adherence to a plan can be deadly when circumstances change rapidly. Being flexible means being willing to deviate from the original strategy when necessary, making quick decisions based on the new reality. This could involve changing routes, finding alternative access points, or altering communication methods.
Opportunity in chaos. Resourceful individuals, like good spies, can spot and exploit unexpected opportunities that arise from chaotic or unplanned events. The traffic jam that allowed access to the target building or the lumber shortage that provided concealment for a radio are examples of turning obstacles into advantages.
10. Relationships are Your Greatest Asset: Build Connections
Espionage is truly a people business.
Human intelligence is key. Despite technological advancements, human intelligence (HUMINT) gathered through personal relationships remains critical. Spies build extensive networks, not just with potential assets, but with anyone who might provide information or assistance, from high-level contacts to service staff.
Trust is earned. Building trust is fundamental, whether with an asset, a colleague, or a local contact. This involves demonstrating genuine care, reliability, and competence. An asset needs to trust their case officer with their life, and colleagues need to trust each other to execute complex, dangerous operations as a team.
Connections open doors. Relationships provide access that technology cannot. A well-connected access agent can introduce you to targets, and friendly locals can provide warnings or assistance. These connections are built through consistent, positive interactions and a willingness to help others, creating a reciprocal network of support.
11. Assess Risk Quickly: Use the OODA Loop
What can I do? What are the possibilities? What is the right decision to make with the information I have right now?
Structured decision-making. In high-pressure situations requiring split-second decisions, spies use a process similar to the OODA loop (Observe, Orient, Decide, Act). This framework helps process information rapidly and make the best possible choice based on the current circumstances.
The OODA Loop explained:
- Observe: Gather all available information about the situation from multiple sources.
- Orient: Analyze the information through the lens of your experience, culture, and goals, understanding how your perceptions influence your view.
- Decide: Formulate a course of action based on your observation and orientation.
- Act: Execute the decision, which then changes the situation, restarting the loop.
Continuous cycle. The OODA loop is a continuous cycle; every action changes the environment, requiring immediate re-observation and re-orientation. Practicing this process allows for faster, more effective decision-making under stress, whether in combat, a crisis, or a complex negotiation.
12. Build a Believable Cover: Live Your Legend
I don’t want to go out in the field until I really believe I am that person.
Cover is identity. A spy's cover isn't just a fake name; it's a fully developed persona, a "legend" they must inhabit completely. The most effective covers run parallel to the spy's real skills and background to feel natural and reduce the risk of exposure.
Developing a legend. Creating a believable cover involves meticulous attention to detail, thinking through every aspect of the new identity's life. This includes:
- Interests and knowledge base
- Speech patterns and mannerisms
- Appearance (hair, clothing, shoes)
- Daily habits and preferences (food, hangouts)
- How they would interact with different people
Immersion is key. Spies practice living their cover until it feels like their own identity. Some even take polygraphs under their cover to test its authenticity. The goal is to be so convincing that even under pressure, the spy reacts naturally as the cover persona, preventing mistakes that could reveal their true identity and compromise the mission.
Last updated:
Review Summary
Survive Like a Spy received mixed reviews. Some readers enjoyed the spy stories and found the safety tips useful, while others criticized the frequent self-promotion and website references. Many felt the advice was common sense or easily found elsewhere. The book's strengths were its entertaining anecdotes and practical safety information. Criticisms included repetitive content, obvious tips, and questionable credibility. Some readers appreciated the insights into CIA operations, while others found the author's uncritical view of espionage problematic. Overall, opinions varied widely on the book's value and effectiveness.
Similar Books







Download PDF
Download EPUB
.epub
digital book format is ideal for reading ebooks on phones, tablets, and e-readers.