You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
In this riveting insider’s account, a former inspector general of the CIA compares actual espionage cases and practices with classic and popular spy fiction, showing that the real world of espionage is nearly always stranger and more complicated than even the best spy fiction.Exploring everything from tradecraft and recruitment to bureaucracy and betrayal, The Great Game contrasts fictional spies created by such authors as John Le Carr?, Tom Clancy and Joseph Conrad with their real-life counterparts from Kim Philby to Aldrich Ames. Drawing on his thirty year career with the CIA, Frederick P. Hitz shows that even the most imaginative authors fail to capture the profound human dilemmas raised by real-life cases. Engaging and insightful, The Great Game shines a fascinating light on the veiled history of intelligence.
Highlights of the volume include pioneering essays on the methodology of intelligence studies by Michael Fry and Miles Hochstein, and the future perils of the surveillance state by James Der Derian. Two leading authorities on the history of Soviet/Russian intelligence, Christopher Andrew and Oleg Gordievsky, contribute essays on the final days of the KGB. Also, the mythology surrounding the life of Second World War intelligence chief, Sir William Stephenson, The Man Called Intrepid', is penetrated in a persuasive revisionist account by Timothy Naftali. The collection is rounded off by a series of essays devoted to unearthing the history of the Canadian intelligence service.
Since 1990 offenders are more likely to be naturalized citizens, and to have foreign connections. Their espionage is more likely to be motivated by divided loyalties. Twice as many American espionage offenders since 1990 have been civilians than members of the military, fewer held Top Secret while more held Secret clearances, and 37% had no security clearance. Two thirds of Amer. spies since 1990 have volunteered. Since 1990, 80% of spies received no payment for espionage, and since 2000 it appears no one was paid. Six of the 11 most recent cases have involved terrorists, either as recipients of info., by persons working with accused terrorists at Guantanamo Bay, or in protest against treatment of detainees there. Illustrations.
Espionage, an area of state activity which is vital to international relations, yet which is unregulated by international law, is coming to assume increasing importance in the `New World Order'. International Law and Espionage examines four major areas of public international law: freedom of information and human rights, diplomacy, territory, and armed conflict. A detailed analysis is given of their theoretical and practical connection to the practice of espionage. The relevance of international law to espionage is clearly demonstrated, not least by the absence of any official link between the two (save in time of war). The conclusion is inescapable: it is high time for international legal p...
The advent of cyberspace has led to a dramatic increase in state-sponsored political and economic espionage. This monograph argues that these practices represent a threat to the maintenance of international peace and security and assesses the extent to which international law regulates this conduct. The traditional view among international legal scholars is that, in the absence of direct and specific international law on the topic of espionage, cyber espionage constitutes an extra-legal activity that is unconstrained by international law. This monograph challenges that assumption and reveals that there are general principles of international law as well as specialised international legal reg...
Approaching early modern spies, espionage and secret diplomacy as central elements in (wartime) communication networks, the thirteen contributions to this volume examine different kinds of espionage (economic espionage, political espionage etc.), identify different types of spies - diplomats, postmasters, court musicians, cooks and prostitutes - and reflect the multiple meanings and functions of information obtained through the many practices of spying in the early modern period. Drawing on examples from a wide range of states and empires, the volume looks into recruitment strategies and cryptography, highlights processes of professionalization and traces the reputation of spies ranging from the >honourable to the villain
First Published in 1967, Espionage and Subversion in an Industrial Society presents a comprehensive overview of the true significance of industrial espionage and its relationship with the struggle for economic supremacy of a nation. Industrial espionage is a growth industry and the new battlefield where nations and ideologies struggle for economic supremacy. This and subversive activity may seem relatively harmless in comparison with a ‘hot war’. It is however precisely because the temperature of an all-out war would destroy the civilization, we know that industrial espionage and subversion assume importance. In this book Mr Hamilton has combined his own extensive security knowledge with thorough research in his subjects. This is an interesting read for scholars of diplomacy, international economics, and international politics.
This book examines technical aspects of industrial espionage and its impact in modern companies, organizations, and individuals while emphasizing the importance of intellectual property in the information era. The authors discuss the problem itself and then provide statistics and real world cases. The main contribution provides a detailed discussion of the actual equipment, tools and techniques concerning technical surveillance in the framework of espionage. Moreover, they present the best practices and methods of detection (technical surveillance counter measures) as well as means of intellectual property protection.
Although every country seeks out information on other nations, China is the leading threat when it comes to the theft of intellectual assets, including inventions, patents, and R&D secrets. Trade Secret Theft, Industrial Espionage, and the China Threat provides an overview of economic espionage as practiced by a range of nations from around the