No but

Female spies having short hair of varying lengths because long hair is inconvenient for spy work

Female spies wearing flat shoes or cool as hell boots when on missions because heels are troublesome

Female spies wearing binders on missions because it’s hard to sneak through small spaces with large breasts

Female spies seducing rival female spies

Female spies


The Greatest Itching Powder Prank in History

During World War II British intelligence and Secret Services were probably the best at spying and clandestine warfare in all of history.  Almost every major Allied operation had a good amount of deception and trickery which made the Germans chase their own tails on a number of occasions.  Often, their operations depended on advanced technology, a complicated network of spies and double agents, and a great amount of luck.  However, some British spy operations seemed less like James Bond missions and more like childhood mischief.

During the war, the British SOE (Special Operations Executive) began a program to smuggle itching powder into the Third Reich.  The itching powder developed by SOE was no common joke shop itching powder, but a powder so potent that exposure could be excruciating, with some needing hospitalization if exposed.  The itching powder was smuggled into Germany from Switzerland in foot powder tins, where resistance groups working as laundresses and clothiers sprinkled the powder on military uniforms.  The hardest hit was the German Kriegsmarine (navy), when in October of 1943 25,000 U-Boat crew uniforms were contaminated with the itching powder.  What resulted was a massive epidemic of severe dermatitis that swept through the U-Boat fleet.  The epidemic was so bad that one U-Boat crew had to turn around and return to port for medical treatment. 

German uniforms were not the only target for itching powder attacks.  Other targets included bedding, underwear, and toilet paper.  When a sizable amount of itching powder was smuggled into Norway, the Norwegian resistance made especially effective use of it by sprinkling the powder in condoms.  As a result in Trondheim throughout the war numerous cases of German soldiers being hospitalized for extreme pain from their private parts were reported.

On Spies (Personality)

“Intelligence work has one moral law—it is justified by results.”

-John Le Carre, The Spy Who Came In From The Cold. (10)

Spying is a difficult business. Writing about spies with any accuracy is also an incredibly difficult business; this is why the foundational giants of the genre from Ian Fleming to John Le Carre have been ex-intelligence. Without that background, it can be easy to misunderstand that the ability to be a spy comes from the tradecraft and the training. It’s common among writers to build the character first, then give them their skill set. While this will work for a vast number of different character archetypes, functional spies require a fairly specific outlook and it is developed by a specific type of background though that comes from a generic set of circumstances.

Spies can’t be good people and that’s okay, because good people can’t be spies.


Read More

Watch on

Another number station broadcast called “The Swedish Rhapsody.” Number stations send out encrypted messages to what most consider to be spies, usually involving white noise interrupted by an unknown person reciting numbers. These cannot be tracked. The presumed spy simply needs a radio and they’re set. 

This is one of the first I’ve ever heard with music. How about that lovely melody.

spies ~ they trade secrets for money and they kiss with their guns. (in the morning you’ll remember a bloodstained shirt and a deadly smile, but not the shadow that wore them.) listen download

one. the drop john powell  two. selina kyle’s theme hans zimmer three. mombasa hans zimmer four. chase across d.c. james newton howard five. pretender ninja tracks six. setting up the lair blake neely seven. shangai drive thomas newman eight. wolf suite pt.1 danny elfman nine. flight to compound alexandre desplat ten. cannon fall rick smith eleven. beyond fire t.t.l. twelve. atonement john powell

Watch on

I’ve never been more attracted to Colin Firth than I am now.

A fight is one of the quickest ways to tell if someone isn’t who they say they are. If you say you’re Russian, but fight like an American, you can consider your cover blown. Which means you’d better know Sambo, the mixed martial art of Russia. Of course, then you also have to win the fight. A great cover I.D. Doesn’t help much if you’re dead.
—  Michael Westen, Burn Notice 204 “Comrades”

Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.

Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government.

Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).

But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations

Are you being gamed?


Summary: Dan goes to a school for spies, he’s not supposed to be noticed, not supposed to be given a second glance, but Phil seems to see him, actually see him, and not just his cover. 

Genre: Fluff

Word Count: 2.5k

Warnings: None

“Alright” The voice rang out, cutting through the air. The wind whipped once more, grabbing the last bit of the word and taking it for itself. Dan pulled his coat around himself, but it wasn’t his coat. Those weren’t his shoes either, that wasn’t his shirt, and those definitely were not his glasses. It was all just a costume, a disguise, clothes picked with an aim in mind. To blend in, to become your surroundings, to be as plain as the day around you. Dan was already a natural at being plain, his hair a patent sort of brown, with eyes to match, his features proportional and unpretentious, it wasn’t the sort of face you looked at twice.

Read More

During the early stages of World War I the German government unleashed an aggressive campaign of sabotage and spying on U.S. soil.  Today we explore this “secret war” and the little-known stories behind the “first terrorist cell in America” with author Howard Blum. He explains the early attempts at sabotage:

"The logic of the German spy masters — and this was a very narrow logic, and I don’t think they understood the American mind — [was that] if they could keep America occupied, if America had to worry about what was happening at home — to its own munitions factories, to its own even subways and bridges — if America had to fear what was happening along the home front, then they wouldn’t have … the volition to want to go off and fight in a war across an ocean."

photo of the Black Tom explosion in 1916 via Smithsonian/wikimedia commons