HOME

TheInfoList



OR:

Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information ( intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tang ...
(spying) and generally, as part of the activity of
intelligence assessment Intelligence assessment, or simply intel, is the development of behavior forecasts or recommended courses of action to the leadership of an organisation, based on wide ranges of available overt and covert information (intelligence). Assessments d ...
. This includes general topics or techniques (
dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals c ...
s, for example), or the specific techniques of a nation or organization (the particular form of
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can d ...
(encoding) used by the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
, for example).


Examples

*
Agent handling In intelligence organizations, agent handling is the management of so-called agents (called secret agents or spies in common parlance), principal agents, and agent networks (called "assets") by intelligence officers typically known as case o ...
is the management of espionage agents, principal agents, and agent networks (called "assets") by
intelligence officer An intelligence officer is a person employed by an organization to collect, compile or analyze information (known as intelligence) which is of use to that organization. The word of ''officer'' is a working title, not a rank, used in the same way ...
s, who are typically known as case officers. * Analytic tradecraft is the body of specific methods for intelligence analysis. *
Black bag operation Black bag operations or black bag jobs are covert or clandestine entries into structures to obtain information for human intelligence operations. Some of the tactics, techniques, and procedures associated with black bag operations are lock p ...
s are
covert Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controvers ...
or clandestine entries into structures or locations to obtain information for
human intelligence Human intelligence is the intellectual capability of humans, which is marked by complex cognitive feats and high levels of motivation and self-awareness. High intelligence is associated with better outcomes in life. Through intelligence, humans ...
operations. This may require breaking and entering,
lock picking Lock picking is the practice of unlocking a lock by manipulating the components of the lock device without the original key. Although lock-picking can be associated with criminal intent, it is an essential skill for the legitimate profess ...
,
safe cracking Safe-cracking is the process of opening a safe without either the combination or the key. Physical methods Different procedures may be used to crack a safe, depending on its construction. Different procedures are required to open different safes ...
, key impressions,
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
ing,
photography Photography is the art, application, and practice of creating durable images by recording light, either electronically by means of an image sensor, or chemically by means of a light-sensitive material such as photographic film. It is emplo ...
, electronic
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as ...
(including audio and video surveillance),
mail The mail or post is a system for physically transporting postcards, letters, and parcels. A postal service can be private or public, though many governments place restrictions on private systems. Since the mid-19th century, national postal sys ...
manipulation ("flaps and seals"),
forgery Forgery is a white-collar crime that generally refers to the false making or material alteration of a legal instrument with the specific intent to defraud anyone (other than themself). Tampering with a certain legal instrument may be forb ...
, and a host of other related skills. *
Concealment device Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is tha ...
s are used to hide things for the purpose of
secrecy Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controvers ...
or
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
. Examples in
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information ( intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tang ...
include dead drop spikes for transferring notes or small items to other people, and hollowed-out coins or teeth for concealing
suicide Suicide is the act of intentionally causing one's own death. Mental disorders (including depression, bipolar disorder, schizophrenia, personality disorders, anxiety disorders), physical disorders (such as chronic fatigue syndrome), and ...
pills. *
Cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adv ...
is the practice and study of techniques for
secure communication Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing
communications protocol A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics and synch ...
s that block adversaries. * A
cut-out Cut-out, cutout, or cut out may refer to: * Cutout animation * Cutout (electric power distribution), a combination fuse and knife switch used on power poles * Cutout (espionage), a mechanism used to pass information * Cut-out (philately), an impr ...
is a mutually trusted intermediary, method or channel of communication, facilitating the exchange of information between agents. People playing the role of cutouts usually only know the source and destination of the information to be transmitted, but are unaware of the identities of any other persons involved in the espionage process. Thus, a captured cutout cannot be used to identify members of an espionage cell. * A
dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals c ...
or "dead letter box" is a method of
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information ( intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tang ...
tradecraft used to pass items between two individuals using a secret location and thus does not require them to meet directly. Using a dead drop permits a case officer and agent to exchange objects and information while maintaining operational security. The method stands in contrast to the 'live drop', so-called because two persons meet to exchange items or information. *"Drycleaning" is a
countersurveillance Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is t ...
technique for discerning how many "tails" (following enemy agents) an agent is being followed by, and by moving about, seemingly oblivious to being tailed, perhaps losing some or all of those doing surveillance. *
Eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. Etymology The verb ''eavesdrop'' is a back-formation from the noun ''eaves ...
is secretly listening to the conversation of others without their consent, typically using a hidden microphone or a "bugged" or "tapped" phone line. *
False flag operations A false flag operation is an act committed with the intent of disguising the actual source of responsibility and pinning blame on another party. The term "false flag" originated in the 16th century as an expression meaning an intentional misr ...
is a covert military or paramilitary operation designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them. Operations carried out during peace-time by civilian organizations, as well as covert government agencies, may by extension be called false flag. *A
front organization A front organization is any entity set up by and controlled by another organization, such as intelligence agencies, organized crime groups, terrorist organizations, secret societies, banned organizations, religious or political groups, advocacy ...
is any entity set up by and controlled by another organization, such as
intelligence agencies An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security, military, public safety, and foreign policy objectives. Means of informatio ...
. Front organizations can act for the parent group without the actions being attributed to the parent group. A front organization may appear to be a business, a foundation, or another organization. *A honey trap is a deceptive operation in which an attractive agent lures a targeted person into a romantic liaison and encourages them to divulge secret information during or after a sexual encounter. *
Interrogation Interrogation (also called questioning) is interviewing as commonly employed by law enforcement officers, military personnel, intelligence agencies, organized crime syndicates, and terrorist organizations with the goal of eliciting useful inf ...
is a type of interviewing employed by officers of the police, military, and intelligence agencies with the goal of eliciting useful information from an uncooperative suspect. Interrogation may involve a diverse array of techniques, ranging from developing a rapport with the subject, to repeated questions, to
sleep deprivation Sleep deprivation, also known as sleep insufficiency or sleeplessness, is the condition of not having adequate duration and/or quality of sleep to support decent alertness, performance, and health. It can be either chronic or acute and may vary ...
or, in some countries,
torture Torture is the deliberate infliction of severe pain or suffering on a person for reasons such as punishment, extracting a confession, interrogation for information, or intimidating third parties. Some definitions are restricted to acts ...
. * A
legend A legend is a genre of folklore that consists of a narrative featuring human actions, believed or perceived, both by teller and listeners, to have taken place in human history. Narratives in this genre may demonstrate human values, and possess ...
refers to a person with a well-prepared and credible made-up identity (cover background) who may attempt to infiltrate a target organization, as opposed to recruiting a pre-existing employee whose knowledge can be exploited. * A
limited hangout A limited hangout or partial hangout is a tactic used in media relations, perception management, politics, and information management. The tactic originated as a technique in the espionage trade. Concept According to Victor Marchetti, a forme ...
is a partial admission of wrongdoing, with the intent of shutting down the further inquiry. * A
microdot A microdot is text or an image substantially reduced in size to prevent detection by unintended recipients. Microdots are normally circular and around in diameter but can be made into different shapes and sizes and made from various materials su ...
is text or an image substantially reduced in size onto a small disc to prevent detection by unintended recipients or officials who are searching for them. Microdots are, fundamentally, a
steganographic Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
approach to message protection. In Germany after the
Berlin Wall The Berlin Wall (german: Berliner Mauer, ) was a guarded concrete barrier that encircled West Berlin from 1961 to 1989, separating it from East Berlin and East Germany (GDR). Construction of the Berlin Wall was commenced by the gover ...
was erected, special cameras were used to generate microdots that were then adhered to letters and sent through the mail. These microdots often went unnoticed by inspectors, and information could be read by the intended recipient using a
microscope A microscope () is a laboratory instrument used to examine objects that are too small to be seen by the naked eye. Microscopy is the science of investigating small objects and structures using a microscope. Microscopic means being invisi ...
. * A
one-time pad In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a ra ...
is an
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can d ...
technique that cannot be
cracked Cracked may refer to: Television * ''Cracked'' (British TV series), a 2008 British comedy-drama television series that aired on STV * ''Cracked'' (Canadian TV series), a 2013 Canadian crime drama series that aired on CBC * "Cracked", a Season 8 ( ...
if used correctly. In this technique, a
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
is paired with random, secret key (or ''pad''). *
One-way voice link A one-way voice link (OWVL) is typically a radio based communication method used by spy networks to communicate with agents in the field typically (but not exclusively) using shortwave radio frequencies. Shortwave frequencies were and are genera ...
is typically a radio-based communication method used by spy networks to communicate with agents in the field typically (but not exclusively) using
shortwave radio Shortwave radio is radio transmission using shortwave (SW) radio frequencies. There is no official definition of the band, but the range always includes all of the high frequency band (HF), which extends from 3 to 30 MHz (100 to 10 m ...
frequencies. Since the 1970s ''infrared point to point communication systems'' have been used that offer one-way voice links , but the number of users was always limited. A numbers station is an example of a one-way voice link, often broadcasting to a field agent who may already know the intended meaning of the code, or use a one-time pad to decode. These numbers stations will continue to broadcast gibberish or random messages according to their usual schedule; this is done to expend the resources of one's adversaries as they try in vain to make sense of the data, and to avoid revealing the purpose of the station or activity of agents by broadcasting solely when needed. *
Steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
is the art or practice of concealing a message, image, or file within another message, image, or file. Generally, the hidden message will appear to be (or be part of) something else: images, articles, shopping lists, or some other ''cover text''. For example, the hidden message may be in
invisible ink Invisible ink, also known as security ink or sympathetic ink, is a substance used for writing, which is invisible either on application or soon thereafter, and can later be made visible by some means, such as heat or ultraviolet light. Invisible ...
between the visible lines of a private letter. The advantage of steganography over
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adv ...
alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—will arouse interest, and may in themselves be incriminating in countries where
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can d ...
is illegal.
Cover Cover or covers may refer to: Packaging * Another name for a lid * Cover (philately), generic term for envelope or package * Album cover, the front of the packaging * Book cover or magazine cover ** Book design ** Back cover copy, part of copy ...
achieves the same end by making the communication appear random or innocuous. *
Surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as ...
is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. This can include observation from a distance by means of electronic equipment (such as
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly ...
cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls); and it can include simple, relatively no- or low-technology methods such as human intelligence agents watching a person and postal interception. The word surveillance comes from a French phrase for "watching over" ("sur" means "from above" and "veiller" means "to watch"). *
TEMPEST Tempest is a synonym for a storm. '' The Tempest'' is a play by William Shakespeare. Tempest or The Tempest may also refer to: Arts and entertainment Films * ''The Tempest'' (1908 film), a British silent film * ''The Tempest'' (1911 film), a ...
is a
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
specification and NATO certification referring to spying on information systems through compromising emanations such as unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and also how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).


In popular culture


In books

In the books of such authors as thriller writer
Grant Blackwood Grant Blackwood (born June 7, 1964) is an American thriller writer and ghostwriter. He wrote the Briggs Tanner series. He co-authored with Clive Cussler ''Spartan Gold'' which reached number 10 on the ''New York Times'' Hardcover Fiction Best Sel ...
, espionage writer
Tom Clancy Thomas Leo Clancy Jr. (April 12, 1947 – October 1, 2013) was an American novelist. He is best known for his technically detailed espionage and military-science storylines set during and after the Cold War. Seventeen of his novels have b ...
, and
spy novel Spy fiction is a genre of literature involving espionage as an important context or plot device. It emerged in the early twentieth century, inspired by rivalries and intrigues between the major powers, and the establishment of modern intelligen ...
ists
Ian Fleming Ian Lancaster Fleming (28 May 1908 – 12 August 1964) was a British writer who is best known for his postwar ''James Bond'' series of spy novels. Fleming came from a wealthy family connected to the merchant bank Robert Fleming & Co., an ...
and
John le Carré David John Moore Cornwell (19 October 193112 December 2020), better known by his pen name John le Carré ( ), was a British and Irish author, best known for his espionage novels, many of which were successfully adapted for film or television. ...
, characters frequently engage in tradecraft, e.g., making or retrieving items from "dead drops", "dry cleaning", and wiring, using, or sweeping for intelligence gathering devices, such as cameras or microphones hidden in the subjects' quarters, vehicles, clothing, or accessories.


In film

* In the 2012 film ''
Zero Dark Thirty ''Zero Dark Thirty'' is a 2012 American thriller film directed by Kathryn Bigelow and written by Mark Boal. The film dramatizes the nearly decade-long international manhunt for Osama bin Laden, leader of terrorist network Al-Qaeda, after ...
'', the main CIA operative Maya noted that her suspected senior al-Qaeda courier was exhibiting signs of using tradecraft. * In the 2006 action thriller motion picture '' Mission: Impossible III'', an operative hid a microdot on the back of a postage stamp. The microdot contained a magnetically stored video file. * In the 2003 sci-fi film ''
Paycheck A paycheck, also spelled paycheque, pay check or pay cheque, is traditionally a paper document (a cheque) issued by an employer to pay an employee for services rendered. In recent times, the physical paycheck has been increasingly replaced by e ...
'', a microdot is a key plot element; the film shows how well a microdot can be made to blend into an environment and how much information such a dot can carry.


See also

*
Clandestine HUMINT operational techniques The Clandestine HUMINT page adheres to the functions within the discipline, including espionage and active counterintelligence. The page deals with Clandestine HUMINT operational techniques, also known as "tradecraft". It applies to clandestine ...
*
United States Geospatial Intelligence Foundation The United States Geospatial Intelligence Foundation (USGIF) is a 501(c)(3) non-profit educational foundation in Virginia dedicated to promoting the geospatial intelligence tradecraft and developing a stronger GEOINT Community with government, ind ...


References


Further reading

*Dhar, M.K. ''Intelligence Trade Craft: Secrets of Spy Warfare''. , 2011. *Jenkins, Peter, ''Surveillance Tradecraft'', , Intel Publishing UK, 2010. *Topalian, Paul Charles. ''Tradecraft Primer: A Framework for Aspiring Interrogators''. CRC Press, 2016.


External links


Tradecraft Notes - via Professor J. Ransom Clark, Muskingum College
{{Soviet Spies Espionage techniques