Difference between revisions of "Tradecraft"
(Break ins) |
(format) |
||
(One intermediate revision by one other user not shown) | |||
Line 8: | Line 8: | ||
==Break ins== | ==Break ins== | ||
− | {{QB | + | {{QB|New Zealand's security intelligence agency, the SIS, carried out multiple clandestine raids, breaking into foreign embassies in Wellington in the latter part of the 1980s, in breach of the Vienna convention. [...] one of the raids was on the Czechoslovakian Embassy in Wellington in 1986 and was a joint operation with Britain's MI6 to steal the Warsaw Pact codes.<ref>http://archive.today/2022.01.10-201222/https://www.newshub.co.nz/home/new-zealand/2020/06/spy-secret-revealed-sis-and-mi6-raided-czechoslovakian-embassy-in-wellington.html</ref>}} |
==Electronic communication== | ==Electronic communication== | ||
− | {{QB | + | {{QB|"When studying the [[Wikileaks]] War Logs, bear in mind that intelligence streams — hardcopy, digital, electromagnetic — are salted with spurious entries as markers to authenticate the stream, identify disruptions and unauthorized plants, direct the product to various collectors with varying levels of [[classification]], and more. The spurious entries will not be distinguishable from the other material, it is their positions in the stream, or omissions from the stream, which will be part of authentication. None of this requires or is protected by encryption, indeed, encryption is customarily used to mislead about other means and methods — which is why it is so loudly touted."<ref>http://cryptome.org/0002/wl-diary-mirror.htm</ref>}} |
==Subversion== | ==Subversion== | ||
{{SMWQ | {{SMWQ | ||
− | |text=(it) is what | + | |text=[...] (it) is what anyone in any senior position at the CIA will tell you - It is about turning people [...] |
|subjects= | |subjects= | ||
|author=Timothy Felix Miltz | |author=Timothy Felix Miltz |
Latest revision as of 11:57, 26 April 2022
Tradecraft (Espionage) | |
---|---|
Tradecraft is the art of spying.
Break ins
New Zealand's security intelligence agency, the SIS, carried out multiple clandestine raids, breaking into foreign embassies in Wellington in the latter part of the 1980s, in breach of the Vienna convention. [...] one of the raids was on the Czechoslovakian Embassy in Wellington in 1986 and was a joint operation with Britain's MI6 to steal the Warsaw Pact codes.[1]
Electronic communication
"When studying the Wikileaks War Logs, bear in mind that intelligence streams — hardcopy, digital, electromagnetic — are salted with spurious entries as markers to authenticate the stream, identify disruptions and unauthorized plants, direct the product to various collectors with varying levels of classification, and more. The spurious entries will not be distinguishable from the other material, it is their positions in the stream, or omissions from the stream, which will be part of authentication. None of this requires or is protected by encryption, indeed, encryption is customarily used to mislead about other means and methods — which is why it is so loudly touted."[2]
Subversion
“[...] (it) is what anyone in any senior position at the CIA will tell you - It is about turning people [...]”
(Dec 11, 2013) [3]
Examples
Page name | Description |
---|---|
Asset | A resource by means of which intelligence is gathered; but also a person through whom things are getting done. |
Classification | Intelligence classification are methods by which different levels of access based on the sensitivity of the information are designated to different people; generally used to prevent unauthorized individuals from viewing or leaking sensitive data. |
Compartmentalisation | An ancient technique of dividing information up between people to prevent the 'bigger picture' from being available to any of them. |
Handler | |
Honeytrap | investigative tactic involving the use of sex. |
Limited hangout | A propaganda technique to try to suppress the revelation of secret information. |
Need to know | Giving information only when needed to only those people who need it is fundamental to both tradecraft and statecraft. |
Sheep dipping | Sheep dipping is an espionage term for the process of giving someone an experience which will assist in their misrepresentation. |
Special access program | |
Statecraft | Covertly running a state requires a special skill set, which this website terms "statecraft", a reference to the UK Deep state's Institute for Statecraft. |