Tradecraft

Last updated

This Mark IV microdot camera could be used to take pictures of documents. The microdot film was so tiny it could be hidden in a spy's personal effects and smuggled out of a location. Microdot camera markiv.jpg
This Mark IV microdot camera could be used to take pictures of documents. The microdot film was so tiny it could be hidden in a spy's personal effects and smuggled out of a location.

Tradecraft, within the intelligence community, refers to the techniques, methods, and technologies used in modern espionage (spying) and generally as part of the activity of intelligence assessment. This includes general topics or techniques (dead drops, for example), or the specific techniques of a nation or organization (the particular form of encryption (encoding) used by the National Security Agency, for example).

Contents

Examples

Caltrop used by the US Office of Strategic Services. When scattered on a roadway or runway, the hollow spikes puncture self-sealing rubber tires. The hole in the center allows air to escape even if the other ends of the tube are sealed by soft ground. Caltrop.jpg
Caltrop used by the US Office of Strategic Services. When scattered on a roadway or runway, the hollow spikes puncture self-sealing rubber tires. The hole in the center allows air to escape even if the other ends of the tube are sealed by soft ground.
"Belly-buster", a hand-cranked audio drill strapped to an agent's stomach. It was used during the late 1950s and early 1960s to covertly drill holes into masonry for implanting audio devices, such as microphones. Audio drill.jpg
"Belly-buster", a hand-cranked audio drill strapped to an agent's stomach. It was used during the late 1950s and early 1960s to covertly drill holes into masonry for implanting audio devices, such as microphones.

In books

In the books of such spy novelists as Ian Fleming, John le Carré and Tom Clancy, characters frequently engage in tradecraft, e.g. making or retrieving items from "dead drops", "dry cleaning", and wiring, using, or sweeping for intelligence gathering devices, such as cameras or microphones hidden in the subjects' quarters, vehicles, clothing, or accessories.

In film

See also

Related Research Articles

Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence). A person who commits espionage is called an espionage agent or spy. Any individual or spy ring, in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law.

<span class="mw-page-title-main">One-time pad</span> Encryption technique

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is paired with a random secret key. Then, each bit or character of the plaintext is encrypted by combining it with the corresponding bit or character from the pad using modular addition.

Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning "covered or concealed", and -graphia meaning "writing".

<span class="mw-page-title-main">Secrecy</span> Practice of hiding information to certain individual or group for personal or interpersonal reason

Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.

A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.

<span class="mw-page-title-main">Counterintelligence</span> Offensive measures using enemy information

Counterintelligence (counter-intelligence) or counterespionage (counter-espionage) is any activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons.

<span class="mw-page-title-main">Microdot</span> Steganograph method of hiding messages

A microdot is text or an image substantially reduced in size to prevent detection by unintended recipients. Microdots are normally circular and around 1 millimetre (0.039 in) in diameter but can be made into different shapes and sizes and made from various materials such as polyester or metal. The name comes from microdots often having been about the size and shape of a typographical dot, such as a period or the tittle of a lowercase i or j. Microdots are, fundamentally, a steganographic approach to message protection.

A covert operation or undercover operation is a military or police operation involving a covert agent or troops acting under an assumed cover to conceal the identity of the party responsible.

<span class="mw-page-title-main">Dead drop</span> Method of espionage tradecraft

A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals via a secret location. By avoiding direct meetings, individuals can maintain operational security. This method stands in contrast to the live drop, which involves a face-to-face exchange.

The Ministry of State Security, abbreviated as MGB, was a ministry of the Soviet Union from 1946 to 1953 which functioned as the country's secret police. The ministry inherited the intelligence and state security responsibilities of the People's Commissariat for Internal Affairs (NKVD) and People's Commissariat for State Security (NKGB). The MGB was led by Viktor Abakumov from 1946 to 1951, then by Semyon Ignatiev until Stalin's death in 1953, upon which it was merged into an enlarged Ministry of Internal Affairs (MVD).

In intelligence organizations, agent handling is the management of so-called agents, principal agents, and agent networks by intelligence officers typically known as case officers.

Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what is said. Other than spoken face-to-face communication with no possible eavesdropper, it is probable that no communication is guaranteed to be secure in this sense, although practical obstacles such as legislation, resources, technical issues, and the sheer volume of communication serve to limit surveillance.

Anti–computer forensics or counter-forensics are techniques used to obstruct forensic analysis.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

Clandestine human intelligence is intelligence collected from human sources using clandestine espionage methods. These sources consist of people working in a variety of roles within the intelligence community. Examples include the quintessential spy, who collects intelligence; couriers and related personnel, who handle an intelligence organization's (ideally) secure communications; and support personnel, such as access agents, who may arrange the contact between the potential spy and the case officer who recruits them. The recruiter and supervising agent may not necessarily be the same individual. Large espionage networks may be composed of multiple levels of spies, support personnel, and supervisors. Espionage networks are typically organized as a cell system, in which each clandestine operator knows only the people in his own cell, perhaps the external case officer, and an emergency method to contact higher levels if the case officer or cell leader is captured, but has no knowledge of people in other cells. This cellular organization is a form of compartmentalisation, which is an important tactic for controlling access to information, used in order to diminish the risk of discovery of the network or the release of sensitive information.

The Clandestine HUMINT page adheres to the functions within the discipline, including espionage and active counterintelligence.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

Cyber spying, cyber espionage, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers through the use of proxy servers, cracking techniques and malicious software including Trojan horses and spyware. Cyber espionage can be used to target various actors- individuals, competitors, rivals, groups, governments, and others- in order to obtain personal, economic, political or military advantages. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.

<span class="mw-page-title-main">Robert Lipka</span>

Robert Stephen Lipka was a former army clerk at the National Security Agency (NSA) who, in 1997, pleaded guilty to conspiracy to commit espionage and was sentenced to 18 years in prison. He was arrested more than 30 years after his betrayal, as there is no statute of limitations for espionage.

References

  1. Rivest, Ronald L. (1990). "Cryptology". In J. Van Leeuwen (ed.). Handbook of Theoretical Computer Science. Vol. 1. Elsevier.
  2. Grant Blackwood (2006). James Patterson (ed.). "Sacrificial Lion". Thriller: Stories to Keep You Up All Night .
  3. Fridrich, Jessica; M. Goljan; D. Soukal (2004). Delp Iii, Edward J; Wong, Ping W (eds.). "Searching for the Stego Key" (PDF). Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI. Security, Steganography, and Watermarking of Multimedia Contents VI. 5306: 70–82. Bibcode:2004SPIE.5306...70F. doi:10.1117/12.521353. S2CID   6773772 . Retrieved 23 January 2014.
  4. Pahati, OJ (2001-11-29). "Confounding Carnivore: How to Protect Your Online Privacy". AlterNet. Archived from the original on 2007-07-16. Retrieved 2008-09-02.
  5. "Mission Darkness Faraday Bag Review: Understanding Its Vital Role In Intelligence Operations". The Gear Bunker. Scott Witner. 14 October 2024.
  6. Product Delivery Order Requirements Package Checklist (PDF), US Air Force, archived from the original (PDF) on 2014-12-29
  7. TEMPEST Equipment Selection Process, NATO Information Assurance, 1981, archived from the original on 2019-02-02, retrieved 2014-12-27
  8. "PARAGRAPH 13- SECURITY GUiDANCE". Archived from the original on 2016-03-11. Retrieved 2016-02-13.
  9. "Archived copy" (PDF). Archived from the original (PDF) on 2015-10-05. Retrieved 2015-10-04.{{cite web}}: CS1 maint: archived copy as title (link)
  10. Jeremy Beck (13 January 2013). "Zero Dark Thirty: Terror, Torture, and Tradecraft". MovieManifesto. Retrieved 14 November 2019.

Further reading