World Library  
Flag as Inappropriate
Email this Article

Cut-out (espionage)

Article Id: WHEBN0014006036
Reproduction Date:

Title: Cut-out (espionage)  
Author: World Heritage Encyclopedia
Language: English
Subject: Espionage, Official cover, Countersurveillance, Cyber spying, Clandestine HUMINT asset recruiting
Collection: Espionage Techniques
Publisher: World Heritage Encyclopedia

Cut-out (espionage)

In espionage parlance, a cut-out is a mutually trusted intermediary, method or channel of communication, facilitating the exchange of information between agents. Cutouts usually only know the source and destination of the information to be transmitted, but are unaware of the identities of any other persons involved in the espionage process. Thus, a captured cutout cannot be used to identify members of an espionage cell.

Outside espionage

Some computer protocols, like Tor, use the equivalent of cutout nodes in their communications networks. Due to the use of multiple layers of encryption, nodes on networks like this do not usually know the ultimate sender or receiver of the data.

In computer networking Darknets can and do have some cut out functionality. Darknets are distinct from other distributed P2P networks as sharing is anonymous (that is, IP addresses are not publicly shared and nodes often forward traffic to other nodes). Thus, with a Darknet, users can communicate with little fear of governmental or corporate interference.[1]

For this reason, Darknets are often associated with dissident political communications, as well as various illegal activities. More generally, the term "darknet" can be used to describe all non-commercial sites on the Internet,[2] or to refer to all "underground" web communications and technologies, most commonly those associated with illegal activity or dissent.[1]

See also


  1. ^ a b Wood, Jessica (2010). "A Digital Copyright Revolution". Richmond Journal of Law and Technology 16 (4). Retrieved 25 October 2011. 
  2. ^ Lasica, J. D. (2005). Darknets: Hollywood's War Against the Digital Generation. Hoboken, NJ: J. Wiley & Sons.  

This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.