Execution is everything.
Intelligence means nothing when it can’t be deployed.
In the field, theories give way to tactics, and principles are either operationalized or abandoned. Citizen Intel’s framework isn’t meant to collect dust in a fieldguide—it’s a functional system of tools and tradecraft meant to be applied under pressure, in contested terrain, against entrenched deception. Whether you’re exposing corruption, dismantling organized crime, or mapping foreign influence networks, the Investigator’s fieldwork must be disciplined, organized, adaptive, and concealed. You must learn to transition theory into practice, forging field-operational readiness from the raw ore of investigative intent.
Covert fieldwork is all about controlling proximity—closing distance without tripping alarms, getting close enough to capture truth in high resolution, and staying disciplined enough to never become part of the scene. New recruits struggle with the core rule: collect without being detected. The field isn’t a place to freestyle—one sloppy move burns your cover and puts you at risk. The field is hostile—exposure ends the mission.
I’ve been burned three times in my career—twice in my first few months of manned surveillance, and once much later, after hundreds of clean hours—proof that experience doesn’t make you bulletproof. The first time, I rode the mark too close because I was afraid of losing him in traffic. I hadn’t learned the feel yet—blend with the flow, let cars cut in, give distance, erase yourself from the mirror. I was one car length back when he peeled down a side street, cut into an alley, and popped out somewhere else—classic countersurveillance. He pulled into a residential area and parked. I drove past, acted casual, then looped back—he was gone. Tail lost.
Another early burn was pure rookie optics: I parked too close on a cold stakeout and kept cycling the engine for heat because I hadn’t dressed for the weather. Blacked-out car, on-and-off idling—it might as well have had a sign that said “SUSPICIOUS.” The mark called the police. While officers questioned me, the mark exited and left. I couldn’t document or transition to mobile because the cops were now spinning my wheels. My credentials checked out, cops and I had a good laugh at my expense, but the assignment was still a failure—don’t pass go, don’t collect $200.
The last burn came against an ex-cop in a divorce case. The allegation was drinking and driving before picking up his son from school. The allegation was true—and the alcohol didn’t dull him—it switched on his countersurveillance instincts. Instead of heading to his son’s elementary school, he ran me twenty-minutes away to the airport loop like he was shaking a tail in a training video. At the on-ramp to get back onto the freeway, he held the green arrow turn light through a chorus of blaring horns, then gunned it on yellow and left me boxed in. Tail gone—clean cut. I admired him the rest of the evening on my drive home, slumped over in defeat.
Here’s the lesson: you will get burned. Treat it as a tuition payment. Learn, adjust, improve. You’re a chameleon—adapt or get eaten. And if a target is above your current scope, don’t panic or improvise. Shut it down cleanly and come back when the heat dies down.
To maximize your field protection, every field operation begins with your legend—your cover identity. This isn’t cosplay or theatrical roleplay at a Comic-Con event. It’s operational necessity. Legend building is the craft of engineering a second skin—an unremarkable, internally consistent persona that allows you to move undetected through contested terrain. A good legend doesn’t attract attention. It absorbs it and deflects it. In no way is it meant to dazzle—it’s meant to disappear.
A cover identity is the credible “why I’m here” story you use to support a lawful pretext, and pretexting means communicating under a permissible, non-fraudulent premise to obtain information or access that you couldn’t get if you stated your investigative purpose outright.
Your cover must be believable, repeatable, and forgettable. If it’s too colorful, it invites curiosity. If it’s too vague, it invites scrutiny. Aim for something structurally sound and contextually appropriate—something that holds up under casual questioning. Strip all personal identifiers from your narrative. Avoid real names, hometowns, or affiliations unless absolutely necessary, and never recycle past cover elements once exposed.
Your legend doesn’t just walk into the field—it must exist online, too. In an age where people vet identities with a quick search, the absence of a digital footprint is more suspicious than a fake one. That’s why every solid cover requires a digital shell: a minimally active, plausibly boring social media presence that reinforces your legend without drawing attention. Create a light history—sporadic posts, a few follows, benign content matching your cover’s profession or interests. This is not deepfaking a life—it’s scaffolding one. Just enough noise to pass a surface-level scan.
Take it a layer deeper: create a secondary persona—a fake girlfriend or boyfriend—with cross-tagged posts, casual photos, or generic comments. The illusion of personal life softens suspicion and adds emotional believability to the legend. When someone you meet in the field looks you up later, they need to find a person that fits the story you told them—surrounded by the same digital clutter as everyone else. The legend must live in the metadata, not just the memory.
Let me add a disclaimer here to cover my ass. Pretexting is a tool—not a blank check. Keep it lawful: no impersonation of government officials or other protected roles with legal authority, and no fraud, coercion, harassment, or trespass. Know your jurisdiction—many states require a private investigator license (or licensed oversight) for certain investigative activities.
Next lesson: never enter a location blind. Conduct site surveys in advance—this is your environmental threat assessment. Observe ingress and egress points, security infrastructure, foot traffic patterns, and law enforcement presence. Look for blind spots and chokepoints. Assess lighting, camera angles, vehicle access, and surveillance vectors. When you’re surveilling human targets, study their routines from a distance. Map the rhythms of their behavior. Your job is not just to observe—it’s to extract patterns from the chaos. And from that pattern, build predictive intelligence.
Surveillance and reconnaissance must always appear organic, never staged. Blend into the backdrop—café seating, parked vehicles, pedestrian flow. Use multiple vantage points across time intervals to avoid suspicion. Refrain from over-reliance on digital optics—human eyes adjust to nuance and detect the subtle shifts that software often misses. Artificial intelligence may be thinning the workforce, but it’s not replacing street-level judgment. Manned surveillance stays relevant because humans still detect human nuance better than machines. That’s why manned surveillance and reconnaissance stay in high demand: it’s stable work in a profession that still runs on human nuance.
But surveillance is never a one-way mirror—there’s always a chance that during your operation, you were noticed, and now countermeasures are being deployed against you. How would you know when you’ve been burned—when you don’t even know you’ve been burned? This is where Technical Surveillance Countermeasures (TSCM) become critical.
Routinely sweep your environments—homes, vehicles, workspaces—for surveillance devices: RF transmitters, infrared optics, pinhole cameras, and covert bugs. One of the most effective tools in this arsenal is the ANDRE (Advanced Near-field Detection Receiver), a handheld broadband receiver capable of detecting both known and unknown transmissions—including RF, infrared, visible light, carrier current, and other covert emitters. The full ANDRE kit runs about $3,500.
If that’s outside your current budget, don’t panic. Classic mitigation techniques include rotating devices, avoiding routine, and hardening your operational perimeter. Field safety isn’t a luxury—it’s your survival protocol.
Digital compromise is just as dangerous. If you’re using a phone or laptop, assume it’s already been tagged, tracked, and traced. Use burner phones for communicating with field contacts and air-gapped, encrypted drives for sensitive data. If you’re operating in a high-risk zone, operate digitally silent. Leave no signal, no ping, no record.
In covert fieldwork, discretion is everything. I nearly always leverage the “grey man” concept when I’m in the field. The grey man is someone who blends in so seamlessly with their surroundings that they are almost invisible. They attract no attention, stand out to no one, and leave no trace of their presence. To become a grey man, you focus on being as ordinary as possible—grey-colored clothing, neutral behaviors, and dispassionate body language. You must avoid drawing any attention, whether through overzealous engagement or being too standoffish. The aim is not to be memorable in any way. Plainly put, visualize yourself as being completely grey inside and out.
The grey man doesn’t just hide in plain sight—he vanishes into it. This tactic requires emotional neutrality, physical composure, and behavior so unremarkable it registers like hotel wall art or background props in a school play. You wear what everyone else wears. You speak like they speak. You move with the flow, never against it. Only, you are wearing a palette of grey. You are no one, from nowhere, doing nothing of consequence. Put bluntly, once you master the grey man technique, you will attain adequate adaptability in nearly any field.
Fieldwork is not a cinematic montage—it is attritional and perilous. But it is here, in the silence between movements, in the stillness of watching without being seen, where the war for truth is equally fought.
Once you’ve mastered remaining undetected, the next field priority is ensuring what you collect is usable. In the moment, intelligence is not truth—it’s raw material. Your job in the field is to capture it cleanly, document it accurately, and preserve its integrity so it can be verified later. Start with source credibility at first contact: who is talking, what’s their access, and what’s their motive. Treat every source as motivated until proven otherwise. Maintain chain-of-custody discipline from the second you receive anything. Capture the “who/what/when/where/how” while it’s fresh—because memory degrades and adversaries don’t. When a source needs protection, anonymize strategically—without compromising verification. Protect people, protect the mission, protect the integrity of what you’re collecting.
Ultimately, fieldwork is where most investigations are won—or quietly lost. Stay lawful, stay concealed, and stay disciplined. Collect cleanly, surveil calmly, document relentlessly, and preserve integrity from first contact to final report. When you leave the field, the mission doesn’t end—it changes phases.
Suit up: the next step is crafting a narrative from what you collected—one that’s clear, factual, forceful, and built to withstand pushback.

