Days related to the special operations forces
6 Writing the Training of Special Forces 3

Old Wolf's

Settings
ScrollingScrolling

(2) Undercover and counter-undercover, psychological and counter-psychological, reconnaissance and counter-reconnaissance: Next, we have successfully escaped the suspicion of the enemy through the previous lecture.

If one wanted to stay undercover around the enemy for a long time, obtain useful information, and continuously use ingenious methods to send it out, this was the undercover and anti-undercover, psychological and anti-psychological, investigation and anti-investigation.

When we are alone in the enemy camp for a long time, how do we learn to be undercover and counter undercover? First of all, when you are in the enemy camp, don't believe anyone. You have to have the ability to judge things.

If you wanted to test whether this was true, you had to have a way to get useful information by chatting with others. Generally, only the special forces soldiers in the special forces who had received professional training had this ability. They had no professional knowledge.

People who were professionally trained did not have the ability to get information from others. How could they get information from others? First of all, no matter what others said, you should not believe it.

For example, if the first person told you about this matter and you couldn't judge whether it was true or not, you could go to the third person to get information. Moreover, it was someone who specialized in knowing and managing this information network. The best way to get information was to cater to their preferences.

For example, if you forced him to drink, you could get any useful information. Once a person was drunk, they would lose their mind. You could first think that the information was fake.

Then, he would cleverly use the person in charge of the intelligence network.

She wanted to see if he had any conflicts or quarrels with anyone. She wanted to see if he would be jealous of those who were doing well with him. If there were any, it would be exactly what she wanted.

At this time, he used the conflict between the two of them and the person who had a conflict with him to mix in some information about the information and the conflict between the two of them.

At this time, that person would definitely be very angry and would then truthfully answer the authenticity of the information. When we obtain valuable information, how do we send it out?

At this time, we have to learn to investigate and counter investigation. We have obtained valuable information.

What should we do? We have to go around in circles with the enemy. When the enemy sees that we are not paying attention, we have to learn to change our role-playing.

He could change to another role and identity. Any role was fine. According to the situation at the scene, the area at the scene, and the surrounding environment, he could use and change flexibly.

For example, he could play the role of an old lady in a rural market, and he could play the role of a farmer in a big city.

Then, he would completely get rid of the enemy's tracking, completely get rid of them, and finally transmit the information.

This book is provided by FunNovel Novel Book | Fan Fiction Novel [Beautiful Free Novel Book]

Last Next Contents
Bookshelf ADD Settings
Reviews Add a review
Chapter loading