Difference between revisions of "Tradecraft"

From Wikispooks
Jump to navigation Jump to search
(formatting)
(format)
 
(2 intermediate revisions by 2 users not shown)
Line 6: Line 6:
 
}}
 
}}
 
'''Tradecraft''' is the art of [[spy]]ing.
 
'''Tradecraft''' is the art of [[spy]]ing.
 +
 +
==Break ins==
 +
{{QB|New Zealand's security intelligence agency, the SIS, carried out multiple clandestine raids, breaking into foreign embassies in Wellington in the latter part of the 1980s, in breach of the Vienna convention. [...] one of the raids was on the Czechoslovakian Embassy in Wellington in 1986 and was a joint operation with Britain's MI6 to steal the Warsaw Pact codes.<ref>http://archive.today/2022.01.10-201222/https://www.newshub.co.nz/home/new-zealand/2020/06/spy-secret-revealed-sis-and-mi6-raided-czechoslovakian-embassy-in-wellington.html</ref>}}
 +
 +
==Electronic communication==
 +
{{QB|"When studying the [[Wikileaks]] War Logs, bear in mind that intelligence streams — hardcopy, digital, electromagnetic — are salted with spurious entries as markers to authenticate the stream, identify disruptions and unauthorized plants, direct the product to various collectors with varying levels of [[classification]], and more. The spurious entries will not be distinguishable from the other material, it is their positions in the stream, or omissions from the stream, which will be part of authentication. None of this requires or is protected by encryption, indeed, encryption is customarily used to mislead about other means and methods — which is why it is so loudly touted."<ref>http://cryptome.org/0002/wl-diary-mirror.htm</ref>}}
  
 
==Subversion==
 
==Subversion==
 
{{SMWQ
 
{{SMWQ
|text=(it) is what <u>anyone in any senior position at the CIA will tell you</u> - It is about <u>turning people</u>
+
|text=[...] (it) is what anyone in any senior position at the CIA will tell you - It is about turning people [...]
 
|subjects=
 
|subjects=
 
|author=Timothy Felix Miltz
 
|author=Timothy Felix Miltz
Line 15: Line 21:
 
|date=Dec 11, 2013
 
|date=Dec 11, 2013
 
}}
 
}}
 
==Data streams==
 
{{QB|{{t|"When studying the [[Wikileaks]] War Logs, bear in mind that intelligence streams -- hardcopy, digital, electromagnetic -- are salted with spurious entries as markers to authenticate the stream, identify disruptions and unauthorized plants, direct the product to various collectors with varying levels of [[classification]], and more. The spurious entries will not be distinguishable from the other material, it is their positions in the stream, or omissions from the stream, which will be part of authentication. None of this requires or is protected by encryption, indeed, encryption is customarily used to mislead about other means and methods -- which is why it is so loudly touted."<ref>http://cryptome.org/0002/wl-diary-mirror.htm</ref>}}}}
 
  
 
{{SMWDocs}}
 
{{SMWDocs}}

Latest revision as of 11:57, 26 April 2022

Concept.png Tradecraft 
(Espionage)Rdf-entity.pngRdf-icon.png

Tradecraft is the art of spying.

Break ins

New Zealand's security intelligence agency, the SIS, carried out multiple clandestine raids, breaking into foreign embassies in Wellington in the latter part of the 1980s, in breach of the Vienna convention. [...] one of the raids was on the Czechoslovakian Embassy in Wellington in 1986 and was a joint operation with Britain's MI6 to steal the Warsaw Pact codes.[1]

Electronic communication

"When studying the Wikileaks War Logs, bear in mind that intelligence streams — hardcopy, digital, electromagnetic — are salted with spurious entries as markers to authenticate the stream, identify disruptions and unauthorized plants, direct the product to various collectors with varying levels of classification, and more. The spurious entries will not be distinguishable from the other material, it is their positions in the stream, or omissions from the stream, which will be part of authentication. None of this requires or is protected by encryption, indeed, encryption is customarily used to mislead about other means and methods — which is why it is so loudly touted."[2]

Subversion

“[...] (it) is what anyone in any senior position at the CIA will tell you - It is about turning people [...]”
 (Dec 11, 2013)  [3]


 

Examples

Page nameDescription
AssetA resource by means of which intelligence is gathered; but also a person through whom things are getting done.
ClassificationIntelligence classification are methods by which different levels of access based on the sensitivity of the information are designated to different people; generally used to prevent unauthorized individuals from viewing or leaking sensitive data.
CompartmentalisationAn ancient technique of dividing information up between people to prevent the 'bigger picture' from being available to any of them.
Handler
Honeytrapinvestigative tactic involving the use of sex.
Limited hangoutA propaganda technique to try to suppress the revelation of secret information.
Need to knowGiving information only when needed to only those people who need it is fundamental to both tradecraft and statecraft.
Sheep dippingSheep dipping is an espionage term for the process of giving someone an experience which will assist in their misrepresentation.
Special access program
StatecraftCovertly running a state requires a special skill set, which this website terms "statecraft", a reference to the UK Deep state's Institute for Statecraft.
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.



References


57px-Notepad icon.png This is a page stub. Please add to it.