Trade Craft
   HOME

TheInfoList



OR:

Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
(spying) and generally, as part of the activity of intelligence assessment. This includes general topics or techniques (
dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals ca ...
s, for example), or the specific techniques of a nation or organization (the particular form of
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
(encoding) used by the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
, for example).


Examples

*
Agent handling In intelligence organizations, agent handling is the management of so-called agents (called secret agents or spies in common parlance), principal agents, and agent networks (called "assets") by intelligence officers typically known as case o ...
is the management of espionage agents, principal agents, and agent networks (called "assets") by intelligence officers, who are typically known as case officers. * Analytic tradecraft is the body of specific methods for intelligence analysis. * Black bag operations are
covert Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controvers ...
or
clandestine Clandestine may refer to: * Secrecy, the practice of hiding information from certain individuals or groups, perhaps while sharing it with other individuals * Clandestine operation, a secret intelligence or military activity Music and entertainmen ...
entries into structures or locations to obtain information for human intelligence operations. This may require breaking and entering, lock picking, safe cracking, key impressions,
fingerprint A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
ing,
photography Photography is the art, application, and practice of creating durable images by recording light, either electronically by means of an image sensor, or chemically by means of a light-sensitive material such as photographic film. It is employed ...
, electronic
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
(including audio and video surveillance),
mail The mail or post is a system for physically transporting postcards, letter (message), letters, and parcel (package), parcels. A postal service can be private or public, though many governments place restrictions on private systems. Since the mid ...
manipulation ("flaps and seals"),
forgery Forgery is a white-collar crime that generally refers to the false making or material alteration of a legal instrument with the specific intent to defraud anyone (other than themself). Tampering with a certain legal instrument may be forbidd ...
, and a host of other related skills. * Concealment devices are used to hide things for the purpose of
secrecy Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controvers ...
or
security Security is protection from, or resilience against, potential harm (or other unwanted coercive change) caused by others, by restraining the freedom of others to act. Beneficiaries (technically referents) of security may be of persons and social ...
. Examples in
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
include dead drop spikes for transferring notes or small items to other people, and hollowed-out coins or teeth for concealing
suicide Suicide is the act of intentionally causing one's own death. Mental disorders (including depression, bipolar disorder, schizophrenia, personality disorders, anxiety disorders), physical disorders (such as chronic fatigue syndrome), and s ...
pills. *
Cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing
communications protocol A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics and synchr ...
s that block adversaries. * A
cut-out Cut-out, cutout, or cut out may refer to: * Cutout animation * Cutout (electric power distribution), a combination fuse and knife switch used on power poles * Cutout (espionage), a mechanism used to pass information * Cut-out (philately), an impr ...
is a mutually trusted intermediary, method or channel of communication, facilitating the exchange of information between agents. People playing the role of cutouts usually only know the source and destination of the information to be transmitted, but are unaware of the identities of any other persons involved in the espionage process. Thus, a captured cutout cannot be used to identify members of an espionage cell. * A
dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals ca ...
or "dead letter box" is a method of
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
tradecraft used to pass items between two individuals using a secret location and thus does not require them to meet directly. Using a dead drop permits a case officer and agent to exchange objects and information while maintaining operational security. The method stands in contrast to the 'live drop', so-called because two persons meet to exchange items or information. *"Drycleaning" is a countersurveillance technique for discerning how many "tails" (following enemy agents) an agent is being followed by, and by moving about, seemingly oblivious to being tailed, perhaps losing some or all of those doing surveillance. *
Eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. Etymology The verb ''eavesdrop'' is a back-formation from the noun ''eaves ...
is secretly listening to the conversation of others without their consent, typically using a hidden microphone or a "bugged" or "tapped" phone line. * False flag operations is a covert military or paramilitary operation designed to deceive in such a way that the operations appear as though they are being carried out by entities, groups, or nations other than those who actually planned and executed them. Operations carried out during peace-time by civilian organizations, as well as covert government agencies, may by extension be called false flag. *A
front organization A front organization is any entity set up by and controlled by another organization, such as intelligence agencies, organized crime groups, terrorist organizations, secret societies, banned organizations, religious or political groups, advocacy gro ...
is any entity set up by and controlled by another organization, such as intelligence agencies. Front organizations can act for the parent group without the actions being attributed to the parent group. A front organization may appear to be a business, a foundation, or another organization. *A honey trap is a
deceptive Deception or falsehood is an act or statement that misleads, hides the truth, or promotes a belief, concept, or idea that is not true. It is often done for personal gain or advantage. Deception can involve dissimulation, propaganda and sleight o ...
operation in which an attractive agent lures a targeted person into a romantic liaison and encourages them to divulge secret information during or after a sexual encounter. *
Interrogation Interrogation (also called questioning) is interviewing as commonly employed by law enforcement officers, military personnel, intelligence agencies, organized crime syndicates, and terrorist organizations with the goal of eliciting useful informa ...
is a type of interviewing employed by officers of the police, military, and intelligence agencies with the goal of eliciting useful information from an uncooperative suspect. Interrogation may involve a diverse array of techniques, ranging from developing a rapport with the subject, to repeated questions, to
sleep deprivation Sleep deprivation, also known as sleep insufficiency or sleeplessness, is the condition of not having adequate duration and/or quality of sleep to support decent alertness, performance, and health. It can be either chronic or acute and may vary ...
or, in some countries,
torture Torture is the deliberate infliction of severe pain or suffering on a person for reasons such as punishment, extracting a confession, interrogation for information, or intimidating third parties. Some definitions are restricted to acts c ...
. * A
legend A legend is a Folklore genre, genre of folklore that consists of a narrative featuring human actions, believed or perceived, both by teller and listeners, to have taken place in human history. Narratives in this genre may demonstrate human valu ...
refers to a person with a well-prepared and credible made-up identity (cover background) who may attempt to infiltrate a target organization, as opposed to recruiting a pre-existing employee whose knowledge can be exploited. * A
limited hangout A limited hangout or partial hangout is a tactic used in media relations, perception management, politics, and information management. The tactic originated as a technique in the espionage trade. Concept According to Victor Marchetti, a former ...
is a partial admission of wrongdoing, with the intent of shutting down the further inquiry. * A microdot is text or an image substantially reduced in size onto a small disc to prevent detection by unintended recipients or officials who are searching for them. Microdots are, fundamentally, a steganographic approach to message protection. In Germany after the
Berlin Wall The Berlin Wall (german: Berliner Mauer, ) was a guarded concrete barrier that encircled West Berlin from 1961 to 1989, separating it from East Berlin and East Germany (GDR). Construction of the Berlin Wall was commenced by the government ...
was erected, special cameras were used to generate microdots that were then adhered to letters and sent through the mail. These microdots often went unnoticed by inspectors, and information could be read by the intended recipient using a
microscope A microscope () is a laboratory instrument used to examine objects that are too small to be seen by the naked eye. Microscopy is the science of investigating small objects and structures using a microscope. Microscopic means being invisibl ...
. * A
one-time pad In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a ran ...
is an
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
technique that cannot be cracked if used correctly. In this technique, a
plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
is paired with random, secret
key Key or The Key may refer to: Common meanings * Key (cryptography), a piece of information that controls the operation of a cryptography algorithm * Key (lock), device used to control access to places or facilities restricted by a lock * Key (map ...
(or ''pad''). *
One-way voice link A one-way voice link (OWVL) is typically a radio based communication method used by spy networks to communicate with agents in the field typically (but not exclusively) using shortwave radio frequencies. Shortwave frequencies were and are gener ...
is typically a radio-based communication method used by
spy Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangib ...
networks to communicate with agents in the field typically (but not exclusively) using
shortwave radio Shortwave radio is radio transmission using shortwave (SW) radio frequencies. There is no official definition of the band, but the range always includes all of the high frequency band (HF), which extends from 3 to 30 MHz (100 to 10 me ...
frequencies. Since the 1970s ''infrared point to point communication systems'' have been used that offer one-way voice links , but the number of users was always limited. A
numbers station A numbers station is a shortwave radio station characterized by broadcasts of formatted numbers, which are believed to be addressed to intelligence officers operating in foreign countries. Most identified stations use speech synthesis to vocal ...
is an example of a one-way voice link, often broadcasting to a field agent who may already know the intended meaning of the code, or use a one-time pad to decode. These numbers stations will continue to broadcast gibberish or random messages according to their usual schedule; this is done to expend the resources of one's adversaries as they try in vain to make sense of the data, and to avoid revealing the purpose of the station or activity of agents by broadcasting solely when needed. * Steganography is the art or practice of concealing a message, image, or file within another message, image, or file. Generally, the hidden message will appear to be (or be part of) something else: images, articles, shopping lists, or some other ''cover text''. For example, the hidden message may be in invisible ink between the visible lines of a private letter. The advantage of steganography over
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—will arouse interest, and may in themselves be incriminating in countries where
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
is illegal.
Cover Cover or covers may refer to: Packaging * Another name for a lid * Cover (philately), generic term for envelope or package * Album cover, the front of the packaging * Book cover or magazine cover ** Book design ** Back cover copy, part of co ...
achieves the same end by making the communication appear random or innocuous. *
Surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. This can include observation from a distance by means of electronic equipment (such as
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly t ...
cameras), or interception of electronically transmitted information (such as Internet traffic or phone calls); and it can include simple, relatively no- or low-technology methods such as human intelligence agents watching a person and postal interception. The word surveillance comes from a French phrase for "watching over" ("sur" means "from above" and "veiller" means "to watch"). * TEMPEST is a
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
specification and NATO certification referring to spying on information systems through compromising emanations such as unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and also how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).


In popular culture


In books

In the books of such authors as thriller writer Grant Blackwood, espionage writer
Tom Clancy Thomas Leo Clancy Jr. (April 12, 1947 – October 1, 2013) was an American novelist. He is best known for his technically detailed espionage and military science, military-science storylines set during and after the Cold War. Seventeen of ...
, and spy novelists
Ian Fleming Ian Lancaster Fleming (28 May 1908 – 12 August 1964) was a British writer who is best known for his postwar ''James Bond'' series of spy novels. Fleming came from a wealthy family connected to the merchant bank Robert Fleming & Co., a ...
and
John le Carré David John Moore Cornwell (19 October 193112 December 2020), better known by his pen name John le Carré ( ), was a British and Irish author, best known for his espionage novels, many of which were successfully adapted for film or television. ...
, characters frequently engage in tradecraft, e.g., making or retrieving items from "dead drops", "dry cleaning", and wiring, using, or sweeping for intelligence gathering devices, such as cameras or microphones hidden in the subjects' quarters, vehicles, clothing, or accessories.


In film

* In the 2012 film ''
Zero Dark Thirty ''Zero Dark Thirty'' is a 2012 American thriller film directed by Kathryn Bigelow and written by Mark Boal. The film dramatizes the nearly decade-long international manhunt for Osama bin Laden, leader of terrorist network Al-Qaeda, after the S ...
'', the main CIA operative Maya noted that her suspected senior al-Qaeda courier was exhibiting signs of using tradecraft. * In the 2006 action thriller motion picture '' Mission: Impossible III'', an operative hid a microdot on the back of a postage stamp. The microdot contained a magnetically stored video file. * In the 2003 sci-fi film ''
Paycheck A paycheck, also spelled paycheque, pay check or pay cheque, is traditionally a paper document (a cheque) issued by an employer to pay an employee for services rendered. In recent times, the physical paycheck has been increasingly replaced by e ...
'', a microdot is a key plot element; the film shows how well a microdot can be made to blend into an environment and how much information such a dot can carry.


See also

*
Clandestine HUMINT operational techniques The Clandestine HUMINT page adheres to the functions within the discipline, including espionage and active counterintelligence. The page deals with Clandestine HUMINT operational techniques, also known as "tradecraft". It applies to clandestine o ...
* United States Geospatial Intelligence Foundation


References


Further reading

*Dhar, M.K. ''Intelligence Trade Craft: Secrets of Spy Warfare''. , 2011. *Jenkins, Peter, ''Surveillance Tradecraft'', , Intel Publishing UK, 2010. *Topalian, Paul Charles. ''Tradecraft Primer: A Framework for Aspiring Interrogators''. CRC Press, 2016.


External links


Tradecraft Notes - via Professor J. Ransom Clark, Muskingum College
{{Soviet Spies Espionage techniques