User:Kayneisha/Books/Bloodlines 02

Source: Wikipedia, the free encyclopedia.


Bloodlines

Project Research: Espionage & Intelligence

Spygame
Espionage
Agent Types
Agent handling
Assassination
Defection
Mole (espionage)
Cold War
Natural resource
Public opinion
Military capability
Official cover
Non-official cover
Clandestine HUMINT
Sabotage
Industrial espionage
Double agent
Agent provocateur
Confusion agent
Sleeper agent
Persona non grata
Spymaster
Action types
Diplomatic immunity
Double-Cross System
Kempeitai
Red Orchestra (espionage)
Office of Strategic Services
Officer (armed forces)
Special Operations Executive
Tradecraft
Concealment device
Covert agent
Covert listening device
Cut-out (espionage)
Cyber spying
Dead drop
False flag
Clandestine HUMINT asset recruiting
Interrogation
Numbers station
One-way voice link
Safe house
Side channel attack
Steganography
Surveillance
Surveillance aircraft
Military animal
Classified information
First Chief Directorate
Intelligence assessment
Labor spy
Intelligence Agencies
Intelligence agency
United States Intelligence Community
List of intelligence agencies
Central Intelligence Agency
Federal Bureau of Investigation
National Security Agency
Chinese intelligence operations in the United States
KGB
Counterintelligence
Signals intelligence
Time (magazine)
The Washington Post
Intelligence Gathering Disciplines
List of intelligence gathering disciplines
Cryptanalysis
Cryptanalysis
Cryptanalysis of the Enigma
Cryptanalysis of the Lorenz cipher
Enigma machine
Machine code
Cryptographers
List of cryptographers
Conel Hugh O'Donel Alexander
Charles Babbage
Agnes Meyer Driscoll
Alan Turing
Abraham Sinkov
Giovanni Soro
Elizebeth Friedman
William F. Friedman
Meredith Gardner
Al-Kindi
Dilly Knox
Marian Rejewski
John Wallis
Nostradamus
Leonardo da Vinci
Life extension
Cartography
Steganography
Steganography tools
Cryptography
BPCS-Steganography
Hacktivismo
Canary trap
Covert channel
Deniable encryption
Invisible ink
Polybius square
Security engineering
Semiotics
Steganographic file system
Digital watermarking
Audio watermark