Tradecraft
Encyclopedia
Tradecraft is a general term that denotes a skill acquired through experience in a (typically clandestine
) trade.
The term is also used within the intelligence community
as a collective word for the techniques used in modern espionage
. It can be used to refer to general topics or techniques (dead drop
s, for example), or the specific techniques of a nation or organization (the particular form of encryption
used by the NSA, for example).
The term in this sense is frequently used in the books of John le Carré
and Tom Clancy
, where characters frequently comment on others' tradecraft (including those of agents from the opposing side).
Clandestine operation
A clandestine operation is an intelligence or military operation carried out in such a way that the operation goes unnoticed.The United States Department of Defense Dictionary of Military and Associated Terms defines "clandestine operation" as "An operation sponsored or conducted by governmental...
) trade.
The term is also used within the intelligence community
Intelligence agency
An intelligence agency is a governmental agency that is devoted to information gathering for purposes of national security and defence. Means of information gathering may include espionage, communication interception, cryptanalysis, cooperation with other institutions, and evaluation of public...
as a collective word for the techniques used in modern espionage
Espionage
Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...
. It can be used to refer to general topics or techniques (dead drop
Dead drop
A dead drop or dead letter box is a method of espionage tradecraft used to pass items between two individuals by using a secret location and thus does not require them to meet directly. Using a dead drop permits a Case Officer and his Agent to exchange objects and information while maintaining...
s, for example), or the specific techniques of a nation or organization (the particular form of encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...
used by the NSA, for example).
The term in this sense is frequently used in the books of John le Carré
John le Carré
David John Moore Cornwell , who writes under the name John le Carré, is an author of espionage novels. During the 1950s and the 1960s, Cornwell worked for MI5 and MI6, and began writing novels under the pseudonym "John le Carré"...
and Tom Clancy
Tom Clancy
Thomas Leo "Tom" Clancy, Jr. is an American author, best known for his technically detailed espionage, military science, and techno thriller storylines set during and in the aftermath of the Cold War, along with video games on which he did not work, but which bear his name for licensing and...
, where characters frequently comment on others' tradecraft (including those of agents from the opposing side).
Intelligence technology and techniques
- Internet policeInternet policeInternet police is a generic term for police and secret police departments and other organizations in charge of policing Internet in a number of countries...
- Front organizationFront organizationA front organization is any entity set up by and controlled by another organization, such as intelligence agencies, organized crime groups, banned organizations, religious or political groups, advocacy groups, or corporations...
- CryptographyCryptographyCryptography is the practice and study of techniques for secure communication in the presence of third parties...
- SteganographySteganographySteganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity...
- Dead dropDead dropA dead drop or dead letter box is a method of espionage tradecraft used to pass items between two individuals by using a secret location and thus does not require them to meet directly. Using a dead drop permits a Case Officer and his Agent to exchange objects and information while maintaining...
- Cut-outCut-out (espionage)In espionage parlance, a cutout is a mutually trusted intermediary, method or channel of communication, facilitating the exchange of information between agents. Cutouts usually only know the source and destination of the information to be transmitted, but are unaware of the identities of any other...
- EavesdroppingEavesdroppingEavesdropping is the act of secretly listening to the private conversation of others without their consent, as defined by Black's Law Dictionary...
- SurveillanceSurveillanceSurveillance is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner...
- One-time padOne-time padIn cryptography, the one-time pad is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit or character from a secret random key of the same length as the plaintext, resulting...
- One-way voice linkOne-way voice linkA one-way voice link is a shortwave radio communication method used by spy networks to communicate with agents in the field. This system often employs recorders to transmit pre-recorded messages in real time or in 'burst transmissions,' which minimize the time that a spy needs to be 'on the...
- Concealment deviceConcealment deviceConcealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin...
- Agent handlingAgent handlingIn intelligence organizations, agent handling is the management of agents, principal agents, and agent networks by intelligence officers typically known as case officers.-Human intelligence:...
- InterrogationInterrogationInterrogation is interviewing as commonly employed by officers of the police, military, and Intelligence agencies with the goal of extracting a confession or obtaining information. Subjects of interrogation are often the suspects, victims, or witnesses of a crime...
- Black bag operations
- False flag operationsFalse flagFalse flag operations are covert operations designed to deceive the public in such a way that the operations appear as though they are being carried out by other entities. The name is derived from the military concept of flying false colors; that is flying the flag of a country other than one's own...
- Honey trap
- TEMPESTTEMPESTTEMPEST is a codename referring to investigations and studies of compromising emission . Compromising emanations are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any...
— Protection devices for communication equipment - Wetwork