Tradecraft

This Mark IV microdot camera could be used to take pictures of documents. The microdot film was so tiny it could be hidden in a spy's personal effects and smuggled out of a location.

Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern espionage (spying) and generally, as part of the activity of intelligence. This includes general topics or techniques (dead drops, for example), or the specific techniques of a nation or organization (the particular form of encryption (encoding) used by the National Security Agency, for example).

Intelligence technology and techniques

Caltrop used by the US Office of Strategic Services. When scattered on a roadway or runway, the hollow spikes puncture self-sealing rubber tires. The hole in the center allows air to escape even if the other end of the tube is sealed by soft ground.
"Belly-buster", a hand-cranked audio drill strapped to an agent's stomach. It was used during the late 1950s and early 1960s to covertly drill holes into masonry for implanting audio devices, such as microphones.

In the books of such authors as thriller writer Grant Blackwood, espionage writer Tom Clancy, and spy novelists Ian Fleming and John le Carré, characters frequently engage in tradecraft, e.g., making or retrieving items from "dead drops", "dry cleaning", and wiring, using, or sweeping for intelligence gathering devices, such as cameras or microphones hidden in the subjects' quarters, vehicles, clothing, or accessories.

In film

See also

References

  1. Rivest, Ronald L. (1990). "Cryptology". In J. Van Leeuwen. Handbook of Theoretical Computer Science. 1. Elsevier.
  2. Grant Blackwood & James Patterson (Editor) (2006). "Sacrificial Lion". Thriller: Stories to Keep You Up All Night. line feed character in |work= at position 30 (help)
  3. Fridrich, Jessica; M. Goljan; D. Soukal (2004). "Searching for the Stego Key" (PDF). Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents VI. 5306: 70–82. Retrieved 23 January 2014.
  4. Pahati, OJ (2001-11-29). "Confounding Carnivore: How to Protect Your Online Privacy". AlterNet. Archived from the original on 2007-07-16. Retrieved 2008-09-02.
  5. Product Delivery Order Requirements Package Checklist (PDF), US Air Force
  6. TEMPEST Equipment Selection Process, NATO Information Assurance, 1981
  7. https://fas.org/spp/starwars/program/sbl/09a_10_Jul_DD_254_Attach.htm
  8. http://static.e-publishing.af.mil/production/1/saf_cio_a6/publication/afi33-200/afi33-200.pdf

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.