Difference between revisions of "Tradecraft"
(Data streams) |
(formatting) |
||
Line 17: | Line 17: | ||
==Data streams== | ==Data streams== | ||
− | "When studying the Wikileaks War Logs, bear in mind that intelligence streams -- hardcopy, digital, electromagnetic -- are salted with spurious entries as markers to authenticate the stream, identify disruptions and unauthorized plants, direct the product to various collectors with varying levels of classification, and more. The spurious entries will not be distinguishable from the other material, it is their positions in the stream, or omissions from the stream, which will be part of authentication. None of this requires or is protected by encryption, indeed, encryption is customarily used to mislead about other means and methods -- which is why it is so loudly touted."<ref>http://cryptome.org/0002/wl-diary-mirror.htm</ref> | + | {{QB|{{t|"When studying the [[Wikileaks]] War Logs, bear in mind that intelligence streams -- hardcopy, digital, electromagnetic -- are salted with spurious entries as markers to authenticate the stream, identify disruptions and unauthorized plants, direct the product to various collectors with varying levels of [[classification]], and more. The spurious entries will not be distinguishable from the other material, it is their positions in the stream, or omissions from the stream, which will be part of authentication. None of this requires or is protected by encryption, indeed, encryption is customarily used to mislead about other means and methods -- which is why it is so loudly touted."<ref>http://cryptome.org/0002/wl-diary-mirror.htm</ref>}}}} |
− | |||
{{SMWDocs}} | {{SMWDocs}} |
Revision as of 19:54, 30 March 2021
Tradecraft (Espionage) | |
---|---|
Tradecraft is the art of spying.
Contents
Subversion
“(it) is what anyone in any senior position at the CIA will tell you - It is about turning people”
(Dec 11, 2013) [1]
Data streams
"When studying the Wikileaks War Logs, bear in mind that intelligence streams -- hardcopy, digital, electromagnetic -- are salted with spurious entries as markers to authenticate the stream, identify disruptions and unauthorized plants, direct the product to various collectors with varying levels of classification, and more. The spurious entries will not be distinguishable from the other material, it is their positions in the stream, or omissions from the stream, which will be part of authentication. None of this requires or is protected by encryption, indeed, encryption is customarily used to mislead about other means and methods -- which is why it is so loudly touted."[2]
Examples
Page name | Description |
---|---|
Asset | A resource by means of which intelligence is gathered; but also a person through whom things are getting done. |
Classification | Intelligence classification are methods by which different levels of access based on the sensitivity of the information are designated to different people; generally used to prevent unauthorized individuals from viewing or leaking sensitive data. |
Compartmentalisation | An ancient technique of dividing information up between people to prevent the 'bigger picture' from being available to any of them. |
Handler | |
Honeytrap | investigative tactic involving the use of sex. |
Limited hangout | A propaganda technique to try to suppress the revelation of secret information. |
Need to know | Giving information only when needed to only those people who need it is fundamental to both tradecraft and statecraft. |
Sheep dipping | Sheep dipping is an espionage term for the process of giving someone an experience which will assist in their misrepresentation. |
Special access program | |
Statecraft | Covertly running a state requires a special skill set, which this website terms "statecraft", a reference to the UK Deep state's Institute for Statecraft. |