HOME

TheInfoList



OR:

In
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
parlance, a cutout is a mutually trusted intermediary, method or channel of communication that facilitates the exchange of information between agents. Cutouts usually know only the source and destination of the information to be transmitted, not the identities of any other persons involved in the espionage process (
need to know The term "need to know", when used by government and other organizations (particularly those related to the military or espionage), describes the restriction of data which is considered very sensitive. Under need-to-know restrictions, even if one ...
basis). Thus, a captured cutout cannot be used to identify members of an espionage cell. The cutout also isolates the source from the destination, so neither necessarily knows the other.


Outside espionage

Some computer protocols, like Tor, use the equivalent of ''cutout nodes'' in their communications networks. The use of multiple layers of encryption usually stops nodes on such networks from knowing the ultimate sender or receiver of the data. In
computer network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are m ...
ing, darknets have some cutout functionality.
Darknet A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social n ...
s are distinct from other distributed
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
(P2P) networks, as sharing is anonymous, ''i.e.'',
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
es are not publicly shared and nodes often forward traffic to other nodes. Thus, with a darknet, users can communicate with little fear of governmental or corporate interference. Darknets are thus often associated with dissident political communications as well as various illegal activities.


See also

*
Dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals ...


References

Espionage techniques {{Espionage-stub