ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to be a Ninja in Disguise

Updated on January 31, 2011

Disguise and deception were the primary survival tools of a ninja. How to be a survivor as an undercover ninja depended on what kind of mission you were executing. As evidenced by the earliest accounts of ninja activities, different disguises suited different situations, and situations in medieval Japan could vary greatly.

Disguised as a Komuso, or Zen Buddhist Monk


The ninja was often required to travel about on the enemy's land for extensive periods of time observing the deployment of troops, their composition end equipment, the defensive capabilities of enemy castles, etc.

In such cases, it was best to go undercover as a monk, and this couldn't have been done any better than by assuming the role of a komuso, a Zen Buddhist monk who played musical instruments, often the flute, and wore huge bags or baskets over his head.

Apart from providing musical entertainment, they were not doing much at all, but their usually routine of bagging for food on the roads of Japan near or inside towns, military camps and castles.

Komuso Monk. Their face is covered by the basket.
Komuso Monk. Their face is covered by the basket.
Yamabushi Monk. Beware! May be a Ninja.
Yamabushi Monk. Beware! May be a Ninja.
Saraguka Dancer. Face covered by Mask.
Saraguka Dancer. Face covered by Mask.

How to be a Ninja Spy

Undercover as a Yamabushi, or Mountain Monk

In full knowledge of how to be a master of pretense, a ninja was in possession of a diverse repertoire of techniques to act out different roles. He didn't always masquerade himself as a komuso.

On missions when the ninja's primary objective was to pay a short visit to a friendly ally and perhaps deliver a message to him, the safest way to get to his destination was by dressing up and acting like an itinerant yamabushi, or mountain monks. These appeared also regularly on the highways of Japan, and it was not uncommon that yamabushi were invited into people's houses to deliver prayers and provide blessings.

Masquerading as Sarugaka Dancer, Musician or Puppeteer


If a ninja had to spy on a daimyo's activity, military or otherwise, from within close proximity to him, the most common disguise technique was to set oneself up as a strolling player, such as a sarugaku dancer or puppeteer. This way the ninja could enter the daimyo's town, sometimes even his castle, without a considerable chance of detection.

On occasions like this, the ninja would be searched for weapons, but since their objective was not to kill, but to gather intelligence about what was going on around the enemy lord, this made little to no difference; not to mention the fact that the ninja could use his musical instruments as weapons or hide actual weapons in them.

No comment.
No comment.

How to be a Ninja and Survive

Daimyo, notable samurai leaders, emissaries, army commanders, pretty much everyone, but perhaps the new batch of Christian missionary priests form Portugal, was well aware of the tactics the ninja employed to infiltrate, spy and even kill.

Therefore, even a hubble Buddhist monk begging for provisions on the Japanese streets might have been be a ninja. In this climate of suspition and paranoid fear coupled with the possibility of treason, you can imagine how difficult it was to be a ninja and stay alive.

Komuso Monk and Saraguka Dancer in one Video

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)