HOME

TheInfoList



OR:

Tradecraft, within the intelligence community, refers to the techniques, methods, and technologies used in modern
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
(spying) and generally as part of the activity of
intelligence assessment Intelligence assessment, is a specific phase of the intelligence cycle which oversees the development of behavior forecasts or recommended courses of action to the leadership of an organization, based on wide ranges of available overt and cover ...
. This includes general topics or techniques ( dead drops, for example), or the specific techniques of a nation or organization (the particular form of
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
(encoding) used by the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
, for example).


Examples

* Agent handling is the management of espionage agents, principal agents, and agent networks (called "assets") by
intelligence officer An intelligence officer is a member of the intelligence field employed by an organization to collect, compile or analyze information (known as intelligence) which is of use to that organization. The word of ''officer'' is a working title, not a r ...
s, who are typically known as case officers. * Analytic tradecraft is the body of specific methods for intelligence analysis. * Black bag operations are
covert Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controver ...
or clandestine entries into structures or locations to obtain information for
human intelligence Human intelligence is the Intellect, intellectual capability of humans, which is marked by complex Cognition, cognitive feats and high levels of motivation and self-awareness. Using their intelligence, humans are able to learning, learn, Concept ...
operations. This may require
breaking and entering Burglary, also called breaking and entering (B&E) or housebreaking, is a property crime involving the illegal entry into a building or other area without permission, typically with the intention of committing a further criminal offence. Usually ...
,
lock picking Lock picking is the practice of unlocking a Lock (security device), lock by manipulating the components of the lock device without the original key. Although lock-picking can be associated with Intention (criminal law), criminal intent, it ...
, safe cracking, key impressions,
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfa ...
ing,
photography Photography is the visual arts, art, application, and practice of creating images by recording light, either electronically by means of an image sensor, or chemically by means of a light-sensitive material such as photographic film. It is empl ...
, electronic
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
(including audio and video surveillance),
mail The mail or post is a system for physically transporting postcards, letter (message), letters, and parcel (package), parcels. A postal service can be private or public, though many governments place restrictions on private systems. Since the mid ...
manipulation ("flaps and seals"),
forgery Forgery is a white-collar crime that generally consists of the false making or material alteration of a legal instrument with the specific mens rea, intent to wikt:defraud#English, defraud. Tampering with a certain legal instrument may be fo ...
, and a host of other related skills. *
Concealment device Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is tha ...
s are used to hide things for the purpose of
secrecy Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controver ...
or
security Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or ...
. Examples in
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
include dead drop spikes for transferring notes or small items to other people, and hollowed-out coins or teeth for concealing
suicide Suicide is the act of intentionally causing one's own death. Risk factors for suicide include mental disorders, physical disorders, and substance abuse. Some suicides are impulsive acts driven by stress (such as from financial or ac ...
pills. *
Cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
is the practice and study of techniques for
secure communication Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing
communications protocol A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of a physical quantity. The protocol defines the rules, syntax, semantics (computer science), sem ...
s that block adversaries. * A cut-out is a mutually trusted intermediary, method or channel of communication, facilitating the exchange of information between agents. People playing the role of cutouts usually only know the source and destination of the information to be transmitted, but are unaware of the identities of any other persons involved in the espionage process. Thus, a captured cutout cannot be used to identify members of an espionage cell. * A dead drop or "dead letter box" is a method of
espionage Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
tradecraft used to pass items between two individuals using a secret location and thus does not require them to meet directly. Using a dead drop permits a case officer and agent to exchange objects and information while maintaining operational security. The method stands in contrast to the 'live drop', so-called because two persons meet to exchange items or information. *"Drycleaning" is a countersurveillance technique for discerning how many "tails" (following enemy agents) an agent is being followed by, and by moving about, seemingly oblivious to being tailed, perhaps losing some or all of those doing surveillance. *
Eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. Etymology The verb ''eavesdrop'' is a back-formation from the noun ''eave ...
is secretly listening to the conversation of others without their consent, typically using a hidden microphone or a "bugged" or "tapped" phone line. * False flag operations is a covert military or paramilitary operation designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them. Operations carried out during peace-time by civilian organizations, as well as covert government agencies, may by extension be called false flag. *A
front organization A front organization is any entity set up by and controlled by another organization, such as intelligence agencies, organized crime groups, terrorist organizations, secret societies, banned organizations, religious or political groups, advocacy ...
is any entity set up by and controlled by another organization, such as intelligence agencies. Front organizations can act for the parent group without the actions being attributed to the parent group. A front organization may appear to be a business, a foundation, or another organization. *A honey trap is a
deceptive Deception is the act of convincing of one or many recipients of untrue information. The person creating the deception knows it to be false while the receiver of the information does not. It is often done for personal gain or advantage. Deceit ...
operation in which an attractive agent lures a targeted person into a romantic liaison and encourages them to divulge secret information during or after a sexual encounter. *
Interrogation Interrogation (also called questioning) is interviewing as commonly employed by law enforcement officers, military personnel, intelligence agencies, organized crime syndicates, and terrorist organizations with the goal of eliciting useful informa ...
is a type of interviewing employed by officers of the police, military, and intelligence agencies with the goal of eliciting useful information from an uncooperative suspect. Interrogation may involve a diverse array of techniques, ranging from developing a rapport with the subject, to repeated questions, to
sleep deprivation Sleep deprivation, also known as sleep insufficiency or sleeplessness, is the condition of not having adequate duration and/or quality of sleep to support decent alertness, performance, and health. It can be either Chronic (medicine), chronic ...
or, in some countries,
torture Torture is the deliberate infliction of severe pain or suffering on a person for reasons including corporal punishment, punishment, forced confession, extracting a confession, interrogational torture, interrogation for information, or intimid ...
. * A
legend A legend is a genre of folklore that consists of a narrative featuring human actions, believed or perceived to have taken place in human history. Narratives in this genre may demonstrate human values, and possess certain qualities that give the ...
refers to a person with a well-prepared and credible made-up identity (cover background) who may attempt to infiltrate a target organization, as opposed to recruiting a pre-existing employee whose knowledge can be exploited. * A
limited hangout A limited hangout or partial hangout is a tactic used in media relations, perception management, politics, and information management. The tactic originated as a technique in the espionage trade. Concept According to Victor Marchetti, a form ...
is a partial admission of wrongdoing, with the intent of shutting down the further inquiry. * A
microdot A microdot is text or an image substantially reduced in size to prevent detection by unintended recipients. Microdots are normally circular and around in diameter but can be made into different shapes and sizes and made from various materials s ...
is text or an image substantially reduced in size onto a small disc to prevent detection by unintended recipients or officials who are searching for them. Microdots are, fundamentally, a
steganographic Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...
approach to message protection. In Germany after the
Berlin Wall The Berlin Wall (, ) was a guarded concrete Separation barrier, barrier that encircled West Berlin from 1961 to 1989, separating it from East Berlin and the East Germany, German Democratic Republic (GDR; East Germany). Construction of the B ...
was erected, special cameras were used to generate microdots that were then adhered to letters and sent through the mail. These microdots often went unnoticed by inspectors, and information could be read by the intended recipient using a
microscope A microscope () is a laboratory equipment, laboratory instrument used to examine objects that are too small to be seen by the naked eye. Microscopy is the science of investigating small objects and structures using a microscope. Microscopic ...
. * A
one-time pad The one-time pad (OTP) is an encryption technique that cannot be Cryptanalysis, cracked in cryptography. It requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, ...
is an
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
technique that cannot be cracked if used correctly. In this technique, a
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
is paired with random, secret key (or ''pad''). * One-way voice link is typically a radio-based communication method used by spy networks to communicate with agents in the field typically (but not exclusively) using
shortwave radio Shortwave radio is radio transmission using radio frequencies in the shortwave bands (SW). There is no official definition of the band range, but it always includes all of the High frequency, high frequency band (HF), which extends from 3 to 30& ...
frequencies. Since the 1970s ''infrared point to point communication systems'' have been used that offer one-way voice links , but the number of users was always limited. A
numbers station A numbers station is a shortwave radio station characterized by broadcasts of formatted numbers, which are believed to be addressed to intelligence officers operating in foreign countries. Most identified stations use speech synthesis to voca ...
is an example of a one-way voice link, often broadcasting to a field agent who may already know the intended meaning of the code, or use a one-time pad to decode. These numbers stations will continue to broadcast gibberish or random messages according to their usual schedule; this is done to expend the resources of one's adversaries as they try in vain to make sense of the data, and to avoid revealing the purpose of the station or activity of agents by broadcasting solely when needed. *
Steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the concealed information would not be evident to an unsuspecting person's examination. In computing/ ...
is the art or practice of concealing a message, image, or file within another message, image, or file. Generally, the hidden message will appear to be (or be part of) something else: images, articles, shopping lists, or some other ''cover text''. For example, the hidden message may be in
invisible ink Invisible ink, also known as security ink or sympathetic ink, is a substance used for writing, which is invisible either on application or soon thereafter, and can later be made visible by some means, such as heat or ultraviolet light. Invisibl ...
between the visible lines of a private letter. The advantage of steganography over
cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—will arouse interest, and may in themselves be incriminating in countries where
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
is illegal. Cover achieves the same end by making the communication appear random or innocuous. *
Surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. This can include observation from a distance by means of electronic equipment (such as
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signa ...
cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls); and it can include simple, relatively no- or low-technology methods such as human intelligence agents watching a person and postal interception. The word surveillance comes from a French phrase for "watching over" ("sur" means "from above" and "veiller" means "to watch"). * TEMPEST is a
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
specification and NATO certification referring to spying on information systems through compromising emanations such as unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and also how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of
communications security Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. In the North Atlantic Treaty Organization ...
(COMSEC).


In popular culture


In books

In the books of such
spy novel Spy fiction is a genre of literature involving espionage as an important context or plot device. It emerged in the early twentieth century, inspired by rivalries and intrigues between the major powers, and the establishment of modern intellig ...
ists as
Ian Fleming Ian Lancaster Fleming (28 May 1908 – 12 August 1964) was a British writer, best known for his postwar ''James Bond'' series of spy novels. Fleming came from a wealthy family connected to the merchant bank Robert Fleming & Co., and his ...
, John le Carré and
Tom Clancy Thomas Leo Clancy Jr. (April 12, 1947 – October 1, 2013) was an American novelist. He is best known for his technically detailed espionage and military science, military-science storylines set during and after the Cold War. Seventeen of ...
, characters frequently engage in tradecraft, e.g. making or retrieving items from "dead drops", "dry cleaning", and wiring, using, or sweeping for intelligence gathering devices, such as cameras or microphones hidden in the subjects' quarters, vehicles, clothing, or accessories.


In film

* In the 2012 film '' Zero Dark Thirty'', the main CIA operative Maya noted that her suspected senior al-Qaeda courier was exhibiting signs of using tradecraft. * In the 2006 action thriller motion picture '' Mission: Impossible III'', an operative hid a microdot on the back of a postage stamp. The microdot contained a magnetically stored video file. * In the 2003 sci-fi film ''
Paycheck A paycheck is traditionally a paper document (cheque) issued by an Employment#Employer, employer to income, pay Employment#Employee, employee for services rendered. In recent times, the physical paycheck has been increasingly replaced by elect ...
'', a microdot is a key plot element; the film shows how well a microdot can be made to blend into an environment and how much information such a dot can carry. * In the Bourne film franchise, Jason Bourne consistently utilizes his skills of tradecraft eg tracking people, faking death, creating confusion, arranging meetings as a strategy, escape and evade, cell phone comms.


See also

* Clandestine HUMINT operational techniques *
United States Geospatial Intelligence Foundation The United States Geospatial Intelligence Foundation (USGIF) is a 501(c)(3) non-profit educational foundation in Virginia dedicated to promoting the geospatial intelligence tradecraft and developing a stronger GEOINT Community with government, ...


References


Further reading

*Dhar, M.K. ''Intelligence Trade Craft: Secrets of Spy Warfare''. , 2011. *Jenkins, Peter, ''Surveillance Tradecraft'', , Intel Publishing UK, 2010. *Topalian, Paul Charles. ''Tradecraft Primer: A Framework for Aspiring Interrogators''. CRC Press, 2016.


External links


Tradecraft
{{Soviet Spies Espionage techniques