1Prologue
47Computer storage
2The intelligence cycle
48Securing the Stolen Information
3Value of Multiple Intelligence Sources
49Bridging The Communication Gap Between The Case Officer And The Spy
4Magic principles used in Tradecraft
50Less-threatening situations
5Ditch principle
51Visible Contact
6The "steal" principle
52Point of Exchange
7The "load" principle
53Courier Service
8The simulation principle
54Mail Service
9The "misdirection" principle
55Encoding the Telephone Communications
10The switch principle
56Cyphering your Email
11Going Gray
57Safe Houses
12Going Black
582 is 1, 1 is None
13Going Black (military)
59Emotions and Stress Management
14Black Ops
60Deep breathing
15Clandestine Operations
61Cognitive Reframing
16What do Operatives do?
62Mindful Meditation
17How To Find A Spy
63Affirmations
18Recruitment Steps
64EFT
19Cultivation of Assets
65Social Engineering
20Agent Recruitment
66Pretexting
21The Unassuming Spy
67What To Do When Challenged
22The Traitor
68Backstop
23The Walk-In Spy
69Foot Surveillance
24The Mole
70One-man Surveillance
25The Enlistee
71Two-man Surveillance
26The Doubled agent
72Three-man Surveillance
27The Sleeper Agent
73Automobile Surveillance
28The Discards
74One-vehicle surveillance
29Cutouts
75AB Surveillance
30The Burn Notice
76ABC Surveillance
31Reasons Why People Become Spies
77Fixed Surveillance
32Anger
78Cleaning Runs
33Betrayals and Revenge
79Installing A Hidden Camera Quickly And Carefully
34Sex and Love
80Go With The Latest Tech Whenever Possible
35Fear
81What Makes A Good Listening Device?
36Desperation and Gain
82Strategies For Securing Your Listening Devices
37Political ideology, Religion, Beliefs
83How a spy would install the equipment
38Using Force As Persuasion
84Spycraft using Artificial Intelligence
39Needed Resources
85Intelligence Gathering With Machine Learning
40Recognition Signals
86AI predictions or inferences
41How operatives stay sober
87Data Analysis And Visualization
42Interrogation and Interviews
88For Counterintelligence Operations
43Security
89Computer Vision For Surveillance
44OSINT
90Leveraging Big Data To Build Better Spycraft Strategies
45The Art of Remembering
91Offensive Driving
46Documentation