Without revealing the penetration, cross-check the information from the agents, including technical analysis of documents and equipment, surveillance, and further research into verifying the agent's story (i.e., legend in tradecraft) While name traces cannot be run on every person mentioned by the agent, do not be stingy with them on persons who have familial, emotional, or business ties with h