Tradecraft
Encyclopedia
Tradecraft is a general term that denotes a skill acquired through experience in a (typically clandestine
Clandestine operation
A clandestine operation is an intelligence or military operation carried out in such a way that the operation goes unnoticed.The United States Department of Defense Dictionary of Military and Associated Terms defines "clandestine operation" as "An operation sponsored or conducted by governmental...

) trade.

The term is also used within the intelligence community
Intelligence agency
An intelligence agency is a governmental agency that is devoted to information gathering for purposes of national security and defence. Means of information gathering may include espionage, communication interception, cryptanalysis, cooperation with other institutions, and evaluation of public...

 as a collective word for the techniques used in modern espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

. It can be used to refer to general topics or techniques (dead drop
Dead drop
A dead drop or dead letter box is a method of espionage tradecraft used to pass items between two individuals by using a secret location and thus does not require them to meet directly. Using a dead drop permits a Case Officer and his Agent to exchange objects and information while maintaining...

s, for example), or the specific techniques of a nation or organization (the particular form of encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

 used by the NSA, for example).

The term in this sense is frequently used in the books of John le Carré
John le Carré
David John Moore Cornwell , who writes under the name John le Carré, is an author of espionage novels. During the 1950s and the 1960s, Cornwell worked for MI5 and MI6, and began writing novels under the pseudonym "John le Carré"...

 and Tom Clancy
Tom Clancy
Thomas Leo "Tom" Clancy, Jr. is an American author, best known for his technically detailed espionage, military science, and techno thriller storylines set during and in the aftermath of the Cold War, along with video games on which he did not work, but which bear his name for licensing and...

, where characters frequently comment on others' tradecraft (including those of agents from the opposing side).

Intelligence technology and techniques

  • Internet police
    Internet police
    Internet police is a generic term for police and secret police departments and other organizations in charge of policing Internet in a number of countries...

  • Front organization
    Front organization
    A front organization is any entity set up by and controlled by another organization, such as intelligence agencies, organized crime groups, banned organizations, religious or political groups, advocacy groups, or corporations...

  • Cryptography
    Cryptography
    Cryptography is the practice and study of techniques for secure communication in the presence of third parties...

  • Steganography
    Steganography
    Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity...

  • Dead drop
    Dead drop
    A dead drop or dead letter box is a method of espionage tradecraft used to pass items between two individuals by using a secret location and thus does not require them to meet directly. Using a dead drop permits a Case Officer and his Agent to exchange objects and information while maintaining...

  • Cut-out
    Cut-out (espionage)
    In espionage parlance, a cutout is a mutually trusted intermediary, method or channel of communication, facilitating the exchange of information between agents. Cutouts usually only know the source and destination of the information to be transmitted, but are unaware of the identities of any other...

  • Eavesdropping
    Eavesdropping
    Eavesdropping is the act of secretly listening to the private conversation of others without their consent, as defined by Black's Law Dictionary...

  • Surveillance
    Surveillance
    Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner...

  • One-time pad
    One-time pad
    In cryptography, the one-time pad is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit or character from a secret random key of the same length as the plaintext, resulting...

  • One-way voice link
    One-way voice link
    A one-way voice link is a shortwave radio communication method used by spy networks to communicate with agents in the field. This system often employs recorders to transmit pre-recorded messages in real time or in 'burst transmissions,' which minimize the time that a spy needs to be 'on the...

  • Concealment device
    Concealment device
    Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin...

  • Agent handling
    Agent handling
    In intelligence organizations, agent handling is the management of agents, principal agents, and agent networks by intelligence officers typically known as case officers.-Human intelligence:...

  • Interrogation
    Interrogation
    Interrogation is interviewing as commonly employed by officers of the police, military, and Intelligence agencies with the goal of extracting a confession or obtaining information. Subjects of interrogation are often the suspects, victims, or witnesses of a crime...

  • Black bag operations
  • False flag operations
    False flag
    False flag operations are covert operations designed to deceive the public in such a way that the operations appear as though they are being carried out by other entities. The name is derived from the military concept of flying false colors; that is flying the flag of a country other than one's own...

  • Honey trap
  • TEMPEST
    TEMPEST
    TEMPEST is a codename referring to investigations and studies of compromising emission . Compromising emanations are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any...

     — Protection devices for communication equipment
  • Wetwork


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK