Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Espionage
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Organization == A spy is a person employed to seek out secret information from a source.<ref name="bar">{{cite web |title=Language of Espionage |url=https://www.spymuseum.org/education-programs/spy-resources/language-of-espionage/ |website=International Spy Museum |access-date=12 July 2021}}</ref> Within the [[United States Intelligence Community]], "[[Asset (intelligence)|asset]]" is more common usage. A [[case officer]] or [[Special Agent]], who may have [[diplomatic protection|diplomatic status]] (i.e., [[official cover]] or [[non-official cover]]), supports and directs the human collector. Cut-outs are [[courier]]s who do not know the agent or case officer but transfer messages. A [[safe house]] is a refuge for spies. Spies often seek to obtain secret information from another source. In larger networks, the organization can be complex with many methods to avoid detection, including [[clandestine cell system]]s. Often the players have never met. Case officers are stationed in foreign countries to recruit and supervise intelligence agents,<ref name="bar" /> who in turn spy on targets in the countries where they are assigned. A spy need not be a citizen of the target country and hence does not automatically commit [[treason]] when operating within it. While the more common practice is to recruit a person already trusted with access to sensitive information, sometimes a person with a well-prepared synthetic identity (cover background), called a ''legend''<ref name="bar" /> in [[tradecraft]], may attempt to infiltrate a target organization. These agents can be moles (who are recruited before they get access to secrets), [[Defection|defectors]] (who are recruited after they get access to secrets and leave their country) or [[Clandestine HUMINT#Defector in place|defectors in place]] (who get access but do not leave). A ''legend'' is also employed for an individual who is not an illegal agent, but is an ordinary citizen who is "relocated", for example, a "protected witness". Nevertheless, such a non-agent very likely will also have a case officer who will act as a controller. As in most, if not all synthetic identity schemes, for whatever purpose (illegal or legal), the assistance of a controller is required. Spies may also be used to spread disinformation in the organization in which they are planted, such as giving false reports about their country's military movements, or about a competing company's ability to bring a product to market. Spies may be given other roles that also require infiltration, such as [[sabotage]]. Many governments spy on their allies as well as their enemies, although they typically maintain a policy of not commenting on this. Governments also employ private companies to collect information on their behalf such as [[SCG International Risk]], [[International Intelligence Limited]] and others. Many organizations, both national and non-national, conduct espionage operations. It should not be assumed that espionage is always directed at the most secret operations of a target country. National and terrorist organizations and other groups are also targeted.<ref>{{Cite web|title=Cyber Espionage to Combat Terrorism|url=https://www.utep.edu/liberalarts/nssi/_Files/docs/Theses1/Utilizing-Cyber-Espionage-to-Combat-Terrorism-Adkins.pdf}}</ref> This is because governments want to retrieve information that they can use to be proactive in protecting their nation from potential terrorist attacks. Communications both are necessary to espionage and [[clandestine operation]]s, and also a great vulnerability when the adversary has sophisticated SIGINT detection and interception capability. Spies rely on COVCOM or covert communication through technically advanced spy devices.<ref name="foo" /> Agents must also transfer money securely.
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Espionage
(section)
Add topic