Clandestine human-source intelligence operational techniques/Related Articles

From Citizendium
Jump to: navigation, search
This article is developing and not approved.
Main Article
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
A list of Citizendium articles, and planned articles, about Clandestine human-source intelligence operational techniques.
See also changes related to Clandestine human-source intelligence operational techniques, or pages that link to Clandestine human-source intelligence operational techniques or to this page or whose text contains "Clandestine human-source intelligence operational techniques".

Parent topics


  • Clandestine cell system [r]: A method for organizing a group in such a way that it can more effectively resist penetration by an opposing organization. [e]
  • Dead drop [r]: Add brief definition or description
  • Katsa [r]: An Israeli term for intelligence operations officer, usually under diplomatic cover [e]
  • Low probability of intercept [r]: A set of techniques to minimize the probability of hostile interception of a radio or radar signal [e]
  • One-time pad [r]: A cipher system in which the cryptographic key, i.e. the secret used to encrypt and decrypt messages, is a sequence of random values, each one of which is only ever used once, and only to encrypt one particular letter or word. [e]
  • Safehouse [r]: A physical or virtual place where the members of a clandestine organization can meet or communicate, with minimal danger of exposure to hostile security personnel. [e]
  • Steganography [r]: The study of techniques for hiding a secret message within an apparently innocent message. [e]

Other related topics