User:Kayneisha/Books/Bloodlines 02

Project Research: Espionage & Intelligence

 * Spygame
 * Espionage


 * Agent Types
 * Agent handling
 * Assassination
 * Defection
 * Mole (espionage)
 * Cold War
 * Natural resource
 * Public opinion
 * Military capability
 * Official cover
 * Non-official cover
 * Clandestine HUMINT
 * Sabotage
 * Industrial espionage
 * Double agent
 * Agent provocateur
 * Confusion agent
 * Sleeper agent
 * Persona non grata
 * Spymaster


 * Action types
 * Diplomatic immunity
 * Double-Cross System
 * Kempeitai
 * Red Orchestra (espionage)
 * Office of Strategic Services
 * Officer (armed forces)
 * Special Operations Executive
 * Tradecraft
 * Concealment device
 * Covert agent
 * Covert listening device
 * Cut-out (espionage)
 * Cyber spying
 * Dead drop
 * False flag
 * Clandestine HUMINT asset recruiting
 * Interrogation
 * Numbers station
 * One-way voice link
 * Safe house
 * Side channel attack
 * Steganography
 * Surveillance
 * Surveillance aircraft
 * Military animal
 * Classified information
 * First Chief Directorate
 * Intelligence assessment
 * Labor spy


 * Intelligence Agencies
 * Intelligence agency
 * United States Intelligence Community
 * List of intelligence agencies
 * Central Intelligence Agency
 * Federal Bureau of Investigation
 * National Security Agency
 * Chinese intelligence operations in the United States
 * KGB
 * Counterintelligence
 * Signals intelligence
 * Time (magazine)
 * The Washington Post


 * Intelligence Gathering Disciplines
 * List of intelligence gathering disciplines
 * Cryptanalysis


 * Cryptanalysis
 * Cryptanalysis of the Enigma
 * Cryptanalysis of the Lorenz cipher
 * Enigma machine
 * Machine code


 * Cryptographers
 * List of cryptographers
 * Conel Hugh O'Donel Alexander
 * Charles Babbage
 * Agnes Meyer Driscoll
 * Alan Turing
 * Abraham Sinkov
 * Giovanni Soro
 * Elizebeth Friedman
 * William F. Friedman
 * Meredith Gardner
 * Al-Kindi
 * Dilly Knox
 * Marian Rejewski
 * John Wallis
 * Nostradamus
 * Leonardo da Vinci
 * Life extension
 * Cartography


 * Steganography
 * Steganography tools
 * Cryptography
 * BPCS-Steganography
 * Hacktivismo
 * Canary trap
 * Covert channel
 * Deniable encryption
 * Invisible ink
 * Polybius square
 * Security engineering
 * Semiotics
 * Steganographic file system
 * Digital watermarking
 * Audio watermark