Let's Make a Move
Fractured fairy ta
Japenese vending m
Big Balls, Big Mou
This is Going to H
Me and My Snake
Desperate Measures
Keep It Real
This Camp is Curse
Beg, Barter, Steal

A Big Surprise...
The Underdogs
Drone Capturing an
Biblical Praportio
Password Policy Re
Loose Lips Sink Sh
Holy cow after 32
Crazy Fights, Snak
I promise that you
Earthquakes and Sh
Trojan Horse", but the U.S. Congress rejected this name, suggesting it sounded like a computer virus. Instead, it was called the National Information Infrastructure (NII) until the name was changed to Internet in the early 1990s, while the term "Trojan Horse" became more frequently used among computer users. During the Vietnam War, a similar term was coined as "Trojan War", to refer to sabotage using decoys or misinformation to draw enemy forces into an ambush. The United States National Security Agency began to develop automated information warfare software programs called Trojan Horses in 2001, although they were never deployed for tactical use. MUD During the Cold War, some MUDs were known as "trolling fleets", in reference to an anti-submarine detection device of the same name. The nickname apparently derives from the idea that some MUDs were "fishing for submarines", using their knowledge of the submarine's communications as bait to lure submarines to surface. This metaphor is based on fishing, because information can be used as bait to lure, and entrap, other people. See also Deception: Operations Deception: Techniques and Training Deception: The Special Operations Executive Deception and disguise in video games History of warfare Red herring Red pill and blue pill Sleeper agent Stealth (military) Signals intelligence Weasel word Witch hunt References Further reading A. H. Hansen (1987). Intelligence Policy, Conflict and World Order. Cambridge University Press. Mark Phythian (2004). Iona: The Biography of a Secret Intelligence Agent: The Life and Times of Captain S. H. O. ("Tar") Robertson, MI6's Greatest Double Agent in History. London: HarperCollins. . (an ethnographic study of intelligence operations in Pakistan). External links The Sovereign Military Order of Malta's website The Institute of World Politics' website The School of Intelligence and Security Studies' website The Centre for Intelligence Research and Analysis' website CIA's article on Information Operations Office of Information Sharing (FBI) Deception techniques in film Category:Military intelligence collection Category:Military science Category:Psychological warfare Category:Propaganda techniques Category:Influence (social and political) Category:Words coined in the 1950s Category:Weapons countermeasures Category:United States intelligence operations Category:Propaganda techniques by medium Category:Media manipulation Category:Cryptography in fiction Category:Cryptography organizations Category:Cryptography publications Category:Social engineering (computer security) Category:Types of espionage Category:Types of organization Category:Articles containing video clips