On spies and stratagems/Agency

The agency Edit

For an organization to be declared as a spy agency (involved in espionage), it only suffices that a structure exists that permits for agents working on its behalf to engage in sanctioned covert operations. It can be state or prevalently controlled a mixture or the two or even a supra national enterprise.

Most if not all spy agencies are also referenced as intelligence agencies or services. It is not uncommon for police forces, criminal organizations and even private investigators to function and use spy techniques and procedures for espionage also referred as "spy-craft"/"trade-craft" or simply "craft" , sometimes also referred as "dark arts". For operations that focus in gathering and processing information, infiltration of other organizations and the subversion of their competition. A simple example would be how police forces attempt "to turn" assets from the opposing side, creating in fact double agents.

The larger portion of spy agencies are directly controlled by national governments or due to "the nature of the business" have governmental oversight. Most often the management of such enterprises is done indirectly via a specialized and distinct (from the rest of the government) hierarchical structure. The power and activities of information services are extremely susceptible of being abused, and history proves that it is so. Dirty deeds do prefer to be done in the dark. This creates a constant need to utilize an often contrived monitoring system, as to balance keeping activities secretive, move responsibility away from blame and to maintain the possibility of deniability. This creates a continuous paradox that often leads to the question "Who watches the watchers?" (from the Latin, Quis custodiet ipsos custodes?), that does not only addresses the access to the information but the responsibility and oversight of the agencies activities.

"Secrecy is maintained not to keep the opposition . . . from knowing what’s going on, because the enemy usually does know. Secrecy exists to keep you, the American public, from knowing what is going on, because in many ways you are the real enemy."

Victor Marchetti, Former Special Assistant to the Deputy Director of the CIA

There is not only the problem of abuse but also that in an open society, especially if democratic, the people would not sanction some of the activities of those agencies and subsequently would repudiate their own governments. This of course is not a problem with the people but in the quality of governance and the level of education/information of a society.

If citizens were properly informed of the factual dangers and necessities, not the artificial ones that collaborate in the prevalent and common obfuscation procedures, there would be a better use of these resources/services and if the increased transparency was reciprocated by other governments, a better world would soon be possible.

What we have today is a middle ground, were closely connected governments/states share these services and information to the common benefit of those governments (not specifically their citizens). This has recently been further exacerbated by globalization where the political power or influence being no longer only based around national interests, but since the cold war started to orbit the defense sector, in special the defense corporations, that have not only themselves become multinationals (or enterprises with multinational investments), but economic interests in general have taken center stage over moral superiority and general good. Most large corporations today will have sections dedicated not only to mass collect and process information, even spy on competitors but also in the function of a myriad of Institutes that, if not active spying, generate reports and intelligence plans/analysis based on often sensitive secret information or simply work to shape public opinion.

This of course is also something that occurs in any other secretive organization, even from the area of organized religion or cults to varying degrees, any institution or organization that does not have to be subject to public scrutiny will have private information that it will actively protect and an interest in acquiring intelligence that can further help its members or realize their own goals.

Another consideration is that most medium to large scale enterprises will have an invested interest in monitoring and gathering information not only on the general public, often reduced to the simpler status of consumers, but their active employees and the background of future ones, in fact this is a microcosms representation of some of the concerns that exist at state level, but in this case the information agency will be the humans resource section.

It is common for spies never to talk about the agency by name outside of a secure involvement, they will use a less obvious nomenclature like "the family", "the shop", "the circus", "the outfit", "the tool-shed", "the firm" and other terms that will be mutually understood by those in the know but innocuous to third parties listening in on the conversation. This is also standard operating procedure (SOP) for most undercover, criminal and secret organizations. The development of "in-house" specific language will not only obfuscate but permit to easily detect leaks and infiltrations.


The creation of a shared culture, past (understanding of related history) and future (communality in goals) is needed to cement social structures. This is one of the primary reasons why the state that took control over education and in part why one of the first steps of a real revolutions starts by removing prominent cultural figures. The same if shown by how external "hostile propaganda" attempts to erode social cohesion. In any case having a shared culture requires acculturation this in place will signify effort, commitment and in the long run a loyalty and sense of protection for the shared similar.

It is interesting to note that the use of specific and distinct nomenclature not only helps creates a private language for those in the know but serves also a secondary purpose at times. As form of a barrier or psychological protection, that not only cleans up "the business" but often enough helps to create a distantiation from events and actions or even a depersonalization to the unnatural human interactions.


To do:
It would be interesting to build a list of such terms, most spy literature and movies created are derived from information from ex-spies and openly provide some information on the "spy" culture.

Of the different spy agencies, the little that is known must be understood as a small glimpse of what truly exists and how they operate.


To do:
Mine wikipedia:Secret service, wikipedia:List of intelligence agencies

The Intelligence Community Edit


Hierarchical and sequential structures, especially popular since Gutenberg, are usually forced and artificial. Intertwingularity is not generally acknowledged — people keep pretending they can make things deeply hierarchical, categorizable and sequential when they can't. Everything is deeply intertwingled.

Ted Nelson, November 10 1998?.

State Edit

State Agencies have legally delegated responsibilities and should comply with international law and treaties. As we will see later in greater detail a state agency, should primarily serve at least the primary objective of preserving the security of the state, both internally and externally. Including the social and political stability of the nation. Security of the state is generally defined as "National security" and is generally divided, even compartmentalized, into external and internal services. It is worth noting that state agencies can control and use private organizations, depending only on the local legislation (or capacity to subvert it). It often hinges on the way a government legislates on matters that regulate personal information, person and capital movement and imports and exports of goods and services, this includes armament and intelligence or restricted know how and technologies. For instance under the US Patriot Act the FBI, Justice Department and other agencies can issue National Security letters that allow the government to access to information on finances and communications without oversight from a judge, including that of American citizens and those that receive the requests are legally obliged not to disclose to anyone that they have even received the request. This type of broad access to personal information is extremely rare in democratic societies.

Coalitions and Multi or supra-state agencies Edit

Private Edit

The inclusion of firms like Google and Face book is mostly due to the size of the data they have access to, this is the case with any multinational corporation especially those that work ares of interest to state security, communications or basic infrastructure. Even if they may not be actively spying, beyond they internal interest, they may be leveraged into doing so. There enterprises are an optimal tools to monitor, shape and survey not only populations in a group but even down to personal interests.

As an example to how in 2007 Yahoo admitted to providing their internet user information to the Chinese government, leading directly to their arbitrary arrest, long-term detention, and abuse and torture, while arguing that in was done in compliance with Chinese law. This international firm decided that its local businesses interested relations supplanted U.S. law and international human rights standards.

This can today occur in a scale that has never been done before. Of particular note is the close relations these enterprises have with intelligence agencies. They do not provide unique services and there are many other similar enterprises but they are flagships in their fields of action. Any other firm that manages personal information in large numbers would be as prone to be used as a governmental tool, but these two also establish a business plan around the information gathered.

But not all organizations have a registered front or presence, or even a declared interest in covert activities, from criminal organizations to some decentralized civic movements there are a group of interests that can only be differentiated by labels.

  • Organized crime (Mafia, Triads, Yakuza, etc...)
  • Insurgent movements, that range from guerrilla, radical, revolutionary, anarchist, terrorist and other irregular organizations, will also be running intelligence operation. These are needed to identify targets, infiltration opportunities as well as actively engaging in relations with other underground operations, for instance as a way to obtain financing (the IRA was known to provide training to South American drug cartels). Most times there is also a interchange of operatives and resources across outfits, by intention (as an infiltration or support action) or simply by the operative's outright conversion.
    The epitome would be for instance the case of Ali Mohamed he was reportedly a CIA double agent and a Egyptian Islamic Jihadist, it is very hard to define at what level he operated, since he could be a simple CIA plant. That is the strongest viewpoint since it removes all implications of extensive incompetence in detecting his activities by the USA and provides further evidence for the artificial creation of the Al-Qaeda umbrella designation, that fails even as a conceptual structure. Leading to an open affiliation claim that should not be taken serious (akin to the problem with establishing affiliations in other ad-hoc distributed groups, like for instance the Anonymous movement). We then get things like Al-Qaeda in the Arabian Peninsula (AQAP) that in accordance with the SITE Institute even runs its own online magazine in English language, Inspire.
  • Cybercriminals
  • Hactivists, groups of people that work together on the Internet and restricted social circles that pursue a common political goal. In a report about 2011 Verizon stated to have determined that 58% of data stolen resulted from hacktivism.
    Any organization that fights to expose secret documentation, planing or activities are engaged in intelligence gathering and dissemination activities.


To do:
Legislation, funding (the black budget, the reptile fund) etc...
Provide clarification on the definition of terrorism. Add w:Weather Underground

Others Edit

As we saw secrets are not limited to political ideologies or military and economic interests. They, as information in general, are about power, control and imposing a specific order or simply a mindset, and so those that intent in pursuing the control of any type of power will ultimately find themselves into conflict with the interests of other groups. Things often devolve to a situation illustrated by the "axis of evil" of George W. Bush that intentionally oversimplified things in an effort to exacerbate polarization. This "you're either with us, or against us" than often comes underlines with the "It's that simple!" (when in fact it isn't) is always a deception of sorts.

Organized religions (or cults) are no different, if not only for self preservation and protection, as a way to exert control over their followers and manage external public opinion. At times even engaging in active operations nefarious to general human society, they are not only information agencies but prime targets for activity monitoring and profiling. Religion due to its communal appeal that often bypasses general society is a fertile ground even promoter of for zealots and fanatics. The semi-open nature and extensive often highly evolved information and relationship network it creates has been many times used as a base to terrorism and a stepping stone to politician power in fact religion was at the core of all political system until the creation of the republican system and the move toward laicism.

Often religious organizations are thought by the general public as archaic institutions or simple organization but nothing would be far from reality. Most rely on very complex hierarchical structure and often with internal layers of compartmentalized access. They actively collect, shape and disseminate information and seek influence over society in general.

While most of the agencies or enterprises have their distinct goals and objectives by the simple nature of the game they not only share the same space of operations but actively interact with each-other even establishing relations that an outsider would deem problematic and in case of governments, not politically supportable if publicly acknowledged. They often share missions objectives, trade assets and not only continually monitor each-other but establish long lasting intelligence sharing networks.

Structure Edit

Most agencies have a somewhat open and public face, this requires not only to offer as front man, someone that takes social political responsibility for the agency's actions, maybe a director and a sub-director, but often these, top fronts, do not have themselves a direct control over operations and may receive only filtered reports. Not only because of the risks for security but by the simple power that they would be able to wield especially if they themselves had any latitude in determining the nature and target of the operations the agency would perform.


To do:
Connection between private enterprises, private interests and political power that manages public interests and funding

Funding Edit


To do:
Complete funding relates to control (Public funding, private funding, self funding). Mine wikipedia:Allegations of CIA drug trafficking.

Responsibilities Edit

Most intelligence agencies have very strict areas of operation. Their responsibilities are varied, they may include execution of several types of tasks even exclusively (as part of a larger intelligence network), tasks like planing, operations, monitoring and reporting, analysis and proposals that can themselves be further split into other various specializations.

A state agency, should primarily serve the interests of the state, however it depending on the state's political structure this may reduced to the interests of a particular government (for example in a dictatorship), it all depends on how nation state interests are interpreted. Some state agencies have reduced scope of operations, for example the public police. In this case its operations becomes directed to the specific function, even if it is normal to exist a large degree of interaction, the sharing of information is generally bottom-up, and there is a delegation of specific functions to the specialized agencies in accordance with the legal requirements, for example counterfeiting, terrorism etc.

One should however note that state security agencies are often excluded to participate in general criminal investigations, because doing so could expose their capacities, structure and agents. This is why there is a separation between the criminal police that often has its own information service and state security agencies. In 2012 in New Zealand in a famous criminal investigation case against Internet tycoon Kim Dotcom towards his extradition to the U.S, this type of problem came into painful realization of the GCSB (Government Communications Security Bureau, NZ state agency). There is even the case that operation requirements may not even be compatible, for example the legal requirements would be different between listening in on communications from a citizen in a criminal case and a known terrorist in a national security operation.

One core objective it to preserve the security of the state, both internally and externally. This is done in several ways, from information gathering and security to the planing for the furthering of state interests at home and abroad.

One other consideration is that any spy agency will often collaborate or subcontract to other enterprises, as a way of increase obfuscation or deniability or simply because they do not have the proper knowledge or resources.

In case of a private agency the interests to protect are often reduced to the maintenance and extension of profitability, since there are specific companies that offer intelligence services to third parties the objectives may be very fluid depending on what is contracted, from the examination of internal security process to the background checks, to corporate espionage (intellectual property and strategy).

As we have seen before agencies (not only state agencies) tend to aggregate. Resulting from these type of collusion or at least convergence around common goals a virtual "ecosystem" is created. The nation that has the better funding becomes the apex predator in a world of finite possibilities, acting as to create a state of subservience and dependency on the other national agencies that share its sphere of influence. This permits not a real sharing of efforts, since trust becomes layered but a power structure that not only exert control but helps to predict interactions. To a point smaller agencies to stay relevant start to act primarily not to the benefit of their own state interests but on maintaining good relations with the stronger partner and the world information stage becomes populated by closely aligned blocks where only the most rich nations have a real say, loosely mirroring what happens in the world's economical and political stage.


To do:
Link agency activity with embassies and economic expansion/warfare and by relation to interest groups. Cover the changes of major powers until WWII as an introduction to the USA central role today. Cover w:J. Edgar Hoover.

Private sector spy activities are more common in the USA. The reason why the USA has so many on the private sector involved in intelligence (or spy), activities is mostly explained by three major reasons.

Historical reasons, since the US has been in some sort of armed conflict for the last decades, it would suffices to understand that politically and economically the US never exited completely the WWII conflict (in the intelligence sense), especially directed toward the ex-USSR, leading to the Cold war against the "communist" ideology. Then we have the Korean war that is in perpetual stand-off but not ended.

The second reason is economical, due to how the US managed to position itself after WWII, it was permitted to take almost unilateral control of the global economy, one need look no further than how the dollar became the reserve monetary currency, this of course makes US economical interests and technologies a prime target for competing powers.

The last reason is sociological, how the US social structure has developed, long before WWII, to serve self interest above the state interest. From the outside one may look to the US as a single nation but internally the US has always been fractionated by being a federated state, where internal competition is almost as fierce as external international pressures (one need to just look how state borders evolved). Add to this the prevailing individualistic mentality that is even fostered on the nations constitution and even simpler security matters becomes a concern for the survivability of the federal government. Then last cornerstone is how society also has been shaped by an economy based in consumption and credit (more than production) and how publicity and marketing and media in general have evolved in the USA as to serve as a social planing and shaping tool, more than anywhere else.

There is no enemy

To the agency, there is no static enemy. There are allies and the opposition, in an ever changing field of operations. Todays "enemy" may be tomorrows ally or even an asset to be leveraged, trader or lost in the pursue of the agency's goals.

Operations Edit

The goals of an agency and its legal framing define its operational responsibilities, or areas of interest and responsibilities. This is the core defining aspect of any agency and the type of information that it will deem relevant and the assets that will require to operate.

Terrorism and Counter-terrorism Edit

To do:
Mine wikipedia:Grupos Antiterroristas de Liberación (GAL, Antiterrorist Liberation Groups)

"Ghost wars" Edit

To do:
Mine wikipedia:Ghost Wars

Capture Edit

To do:

Assassination Edit

To do:

Hostage rescue Edit

To do:

Information and asset management Edit

This includes suppression, creation and dissemination of information with the goals of protecting the agency specific interests or as a aid to meet its goals.


To do:
Official information, Intellectual property (copyright and patents), cartography, target lists.

Information and assets acquisition Edit

To do:

Information and assets classification Edit

To do:
Mine wikipedia:Intelligence assessment

"in the clear"

"in the black"


To do:

Information compartmentalization Edit

Cases are handled often handled by a case officer (CIA), a bureaucratic spy that manages all assets, analysis and planing concerning a given operation. To some degree it acts as a spy ring leader controller, as the contact in the agency.

Multiple layers
Security levels
Burn notice Edit

To do:
Eradicating bad information/assets

Media control Edit
Propaganda Edit
Disinformation Edit

Other security and planning aspects Edit

Damage assessment Edit

To do:
What was lost, who lost it

Blow-back Edit

A blow-back is not simply a public relations crisis. But can have retaliatory repercussions, from the public or the competitions. If grave enough it can even lead to a declaration of war.

While a public relations crisis may threaten the long term survival of an organization, and for this reason, many organization's business continuity planning include PR crisis responses to control the delivery of bad news, the initial statements made to media and thereby control first impressions. A successfully managed PR crisis may actually improve public opinion about an organization. A poorly managed PR crisis may eventually bankrupt an organization.

Operational considerations Edit
Personnel Edit

The agency operational security rests primarily on the commitment of its personnel. More than any other type of institution a spy agency must at all times threat all personnel as security risks. Intentionally, due to negligence or weak standards of operation, most breaches of information tend to reside in the human factor of the agency.

In December of 2012, the NDB (Swiss spy agency) was forced to inform other agencies that shared with it their counter-terrorism information that it had been compromised by one disaffected senior IT technician, that may have stolen massive data (several terabytes) from the Swiss intelligence service's servers onto portable hard drives. It was believed he intended to sell to foreign officials or commercial buyers. (See Reuters article)


To do:
Mine wikipedia:Non-disclosure agreement and similar legal binding secrecy documents.

Stand-down procedures Edit

Stand-down procedures are pre established security protocols, in the form of routine steps, that are required to safely abort or disengage from a particular action.


To do:

Spy network Edit
Spy ring


Deniability Edit
Front Edit

A front is normally a seemingly private enterprise with no direct relation but set up and/or under the control of the spy agency, as to facilitate or provide cover for its activities or specific operations.

Useful types of fronts include law firms, news agencies, banks, air transport agencies, shipping agencies and housing agencies, all useful to hide the activity and offer support for operations.

In the private sector it is more difficult to establish a front (to hide the fact due to legal requirements) or justify these sorts of expenses, it is however normal to acquire (or by subcontract) other specialized firms and hide the relation within the parent's company and financial reports.


To do:
Mine wikipedia:Air America (airline)

Black operations Edit

To do:

Black site Edit

A black site may indicate any type of secret facility, under the agency's control (or of a friendly power). This is not the same as a safe house, that will be covered later, but indicates a secret complex, a mid-to-long term infrastructural asset of the agency with a specific purpose, for instance for manufacturing bombs, counterfeiting currency or like the CIA started to use the term to indicate an agency operated prison.

In 2008-2012 the CIA used black sites that were mostly a series of secret overseas facilities that served as prisons and interrogation centers. The fact that they are overseas permitted the agency to respect USA law (in relation to holding prisoners and in the interrogation proceedings used) and in keeping the operations secret (without state oversight). There was to some point local government collaboration, even in the transportation of the prisoners across jurisdictions.


To do:
Mine wikipedia:Black site

The cold war concept Edit


To do:
Economic/monetary warfare, national influence (cultural/political/economic), response to the MAD doctrine (nuclear)

Technology Edit

Technology is predicated in science, in a national effort on education and the generation of intellectual property, this of course has costs so there are tow avenues to reach technological goals by doing the handwork or stealing it.

While not all technology may have security implications, the costs and dividends have a national impact as we live in a world where economy trumps policy more often than not. This also provides for a deeper relation into private and public interests, where international corporations will often work hand-in-hand with their chosen Governmental benefactor (via taxation, legal and economic protection), where they may even be total or partially owners. It is extremely hard to define what is private and national interest, as all Governments from the onset rise to power to primarily represent and advance the private interest of a subsection of the national population. The distinction therefore in international activities is moot almost all the time beyond the public relation spectrum, even when we talk about explicitly NGOs (Non-govermental organization) they often are all but that.


Ever increasingly, technology controls all human interactions and has come to shape our actions, this motivates spy agencies seek control, even by subversion, of any protocol, automation or electronic devices (ie. phones, automobiles, etc...) and software (ie. operating systems, industrial controllers, etc...) as a way to pursue their goals. Going beyond their normal interest in developing new technologies themselves for a multitude of functions, like information gathering, observation, signal processing and others, to a point that they may even actively promote and generate generally adopted options that will provide the agency an advantage not only in knowhow but about intentionally embedded weaknesses.


To do:
Mention NSA and Windows, control over export of cryptology even Scientology and software. Also China's infiltration via electronic device exports and their pursuit of a National Unified CPU Architecture, that has security implications. Terrorists using electronic devices as cover for bombs would also be interesting. The off-brand 'military-grade' x86 processors, in the library, with the root-granting 'backdoor'

The constantly evolving field of science and technology is not itself only one specific battleground but a source of indispensable resources to keep superiority over all other fields of action. One common term today is "cyber war" or "cyber warfare", and governments spend millions in plans to build up defenses and secure their digital boarders, most of it is simple rhetoric, even with purposes of extending control or suppressing some civic liberties, but lurking in the background ins the increased realization that we live today in a digital world. Operation that previously needed physical presence of agents can be done remotely and information collected and analyzed like never before.

Different goals Edit

Technological options selected to benefit the agency control and security concerns will not necessarily be the for the general public (non-adversary agencies).


To do:

Considerations about standardization and normalization Edit

Standardization of methods, procedures, operations and technology is a sword of two edges in regards to security. Establishing a pattern or modus operandi permits not only to facilitate identification amongst a confusing background, of actions and agents but also deviations from expected norms. This is not only useful to maintain security put to identify leaks or note the opposition. The same concept is also at the core of the issue in regards to heterogeneous and homogeneous options in regards to security, be it of general outlook (like in uniforms) or intrinsic characteristics that can be easily accessed to permit or prevent easy targeting.

In the case of technologies keeping the enemy restricted to a defined set eases any attacks and the required know how, creating even the possibility to leverage supply and production paths of those technologies for the purposes of the agency. This is a core issue in regards to the adoption the agency of any technology, from weapons to computers to vaccines, in targeting any technological system of the opposition.

Imaging Edit

Photographic analysis Edit
Cameras Edit
Microfilm Edit
Photocopiers and Scanners Edit
Air surveillance Edit

To do:
w:Spy basket

Drones Edit
Satellites Edit

Communication Edit


To do:
Link up to the story File:The boy spy; a substantially true record of events during the war of the rebellion. The only practical history of war telegraphers in the field thrilling scenes of battles, captures and escapes (1889) (14759492891).jpg

Signals and Intercepts Edit
Dissimulation Edit
Microdots Edit
Security Edit
Channels and paths Edit
Cryptology Edit

Analog versus Digital Edit

Most spy techniques predate not only the digital revolution but even the industrial revolution, so many of them are adaptations to a new reality and very few are innovative in themselves but exploration of the offering of the new realities, like the stealing of machinery and factory blue prints or even time tables of a production line and reliance in mass production goods in place of skilled craftsmanship was an evolutionary step in facing the industrial revolution, today the subversion of digital systems, utilization of digital storage, indexing and analysis represent the simple continuation of ancient methodologies to satisfy the same old needs regarding security and control.


The cyberwar meme, is a public relations meme, it could even be categorized as a marketing plot since the only real innovation falls into the realm of pure business interests and lacks the maturity and clarity than any innovative security concern requires. To put this into context, the concept of "cyberspace" is not something new, the concept predates even the rise of the Internet and it was first conceptualized in science fiction, including a general view of all its implication, some of them we haven't even yet been realized...

The Internet, or better yet the interconnected world, that in reality has no special relation to the Internet, as it does not start or ends in that particular network, is but the most recent addition to our plane of existence in regards to information. As such the digital world will of course reflect and extend all what is the human experience. Simply a new tool that at best extends and modifies old security paradigms rather than create new ones.

Todays networked world has simply extended the previously battle field. From the information revolution emerged the information warfare, relegating to the wasteful clashing of standard armies as something of the past, something that should be ultimately avoidable. New wars will be mostly about information and conquering minds. From the choreographed battles that were the norm until the Napoleonic wars and the US civil war, war has that evolved into the mass production of death and misery with a need to account the statistical and mathematical erosion of combatants and resources as seen on WWI military action and from there it has been moving away from a symmetric confrontation to asymmetric confrontation, a lesson learned from battle fields of the European decolonization process and the Vietnam War. In the field of intelligence the same thing has happened sooner, especially since WWII with the concept of active resistance and the saboteur, asymmetry and subversion has gained an ever increasing level of importance, something that became doctrine with the rise of Nuclear weaponry and has endured since the end of the Cold War.

Today standard armies utilization will not occur unless the outcome is perfectly expected, even finding enemies for a conventional war is becoming harder due to how we are now living in a global economy that is fast becoming interdependent due to the huge shift of the consumer vs producer relation, in geography and in society in general due to technological advances.

Previous to the new interconnected reality, cyberwarfare was reduced to small scale infiltration, interference (monitoring and corruption) of communications. All involved direct human intervention at some point, not anymore. Today these activities, if time is not a pressing factor, can be done remotely, even automated and by being non-centralized they become extremely hard to detect.

Cyberwarfare raises the costs of the informational infrastructure, due to the monitoring, logging, hardening and redundancies it requires and implies. Ultimately it still is an information game, those that control the technology (hardware and software) production will control the battlefield.


To do:
wikipedia:Flame (malware), wikipedia:Stuxnet, 'Madi' Cyber Espionage Malware Hits Middle East Targets and [http://it.slashdot.org/story/12/09/07/2133205/group-behind-aurora-attack-on-google-still-active


The Internet has brought us all more together, even our secrets. It does not reflects todays realities but permits to never forget one's mistakes.


To do:
Unconventional Adversaries vs. Conventional Wisdom


To do:
Searchable data indexing and collection. The case of Wi-Fi Data Harvesting. Link to 20th century marketing practices.

Forgery Edit

Plants and misdirection Edit

Currency Edit

Identification Edit


To do:
The Mossad's foreign operations have often embarrassed Israel, 'Mossad spies' jailed over New Zealand passport fraud

Credentials Edit

Camouflage Edit

Cameras and image analysis Edit

Bugs (video and audio capturing devices) Edit

Robotics Edit

Transportation Edit

Submarines Edit

Activities Edit