Let's Make a Move
Fractured fairy ta
Japenese vending m
Big Balls, Big Mou
This is Going to H
Me and My Snake
Desperate Measures
Keep It Real
This Camp is Curse
Beg, Barter, StealTrojan Horse", but the U.S. Congress rejected this name, suggesting it sounded like a computer virus. Instead, it was called the National Information Infrastructure (NII) until the name was changed to Internet in the early 1990s, while the term "Trojan Horse" became more frequently used among computer users. During the Vietnam War, a similar term was coined as "Trojan War", to refer to sabotage using decoys or misinformation to draw enemy forces into an ambush.
The United States National Security Agency began to develop automated information warfare software programs called Trojan Horses in 2001, although they were never deployed for tactical use.
MUD
During the Cold War, some MUDs were known as "trolling fleets", in reference to an anti-submarine detection device of the same name. The nickname apparently derives from the idea that some MUDs were "fishing for submarines", using their knowledge of the submarine's communications as bait to lure submarines to surface. This metaphor is based on fishing, because information can be used as bait to lure, and entrap, other people.
See also
Deception: Operations
Deception: Techniques and Training
Deception: The Special Operations Executive
Deception and disguise in video games
History of warfare
Red herring
Red pill and blue pill
Sleeper agent
Stealth (military)
Signals intelligence
Weasel word
Witch hunt
References
Further reading
A. H. Hansen (1987). Intelligence Policy, Conflict and World Order. Cambridge University Press.
Mark Phythian (2004). Iona: The Biography of a Secret Intelligence Agent: The Life and Times of Captain S. H. O. ("Tar") Robertson, MI6's Greatest Double Agent in History. London: HarperCollins. .
(an ethnographic study of intelligence operations in Pakistan).
External links
The Sovereign Military Order of Malta's website
The Institute of World Politics' website
The School of Intelligence and Security Studies' website
The Centre for Intelligence Research and Analysis' website
CIA's article on Information Operations
Office of Information Sharing (FBI)
Deception techniques in film
Category:Military intelligence collection
Category:Military science
Category:Psychological warfare
Category:Propaganda techniques
Category:Influence (social and political)
Category:Words coined in the 1950s
Category:Weapons countermeasures
Category:United States intelligence operations
Category:Propaganda techniques by medium
Category:Media manipulation
Category:Cryptography in fiction
Category:Cryptography organizations
Category:Cryptography publications
Category:Social engineering (computer security)
Category:Types of espionage
Category:Types of organization
Category:Articles containing video clips