Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
13,726 result(s) for "State espionage"
Sort by:
Executing the Rosenbergs : death and diplomacy in a Cold War world
In 1950, Julius and Ethel Rosenberg were arrested for allegedly passing information about the atomic bomb to the Soviet Union, an affair FBI Director J. Edgar Hoover labeled the \"crime of the century.\" Their case became an international sensation, inspiring petitions, letters of support, newspaper editorials, and protests in countries around the world. Nevertheless, the Rosenbergs were executed after years of appeals, making them the only civilians ever put to death for conspiracy-related activities. Yet even after their executions, protests continued. The Rosenberg case quickly transformed into legend, while the media spotlight shifted to their two orphaned sons. In Executing the Rosenbergs, Lori Clune demonstrates that the Rosenberg case played a pivotal role in the world's perception of the United States. Based on newly discovered documents from the State Department, Clune narrates the widespread dissent against the Rosenberg decision in 80 cities and 48 countries. Even as the Truman and Eisenhower administrations attempted to turn the case into pro-democracy propaganda, US allies and potential allies questioned whether the United States had the moral authority to win the Cold War. Meanwhile, the death of Stalin in 1953 also raised the stakes of the executions; without a clear hero and villain, the struggle between democracy and communism shifted into morally ambiguous terrain. Transcending questions of guilt or innocence, Clune weaves the case - and its aftermath - into the fabric of the Cold War, revealing its far-reaching global effects. An original approach to one of the most fascinating episodes in Cold War history, Executing the Rosenbergs broadens a quintessentially American story into a global one. \"-- Provided by publisher.
Spying in America
Can you keep a secret? Maybe you can, but the United States government cannot. Since the birth of the country, nations large and small, from Russia and China to Ghana and Ecuador, have stolen the most precious secrets of the United States. Written by Michael Sulick, former director of CIA's clandestine service,Spying in Americapresents a history of more than thirty espionage cases inside the United States. These cases include Americans who spied against their country, spies from both the Union and Confederacy during the Civil War, and foreign agents who ran operations on American soil. Some of the stories are familiar, such as those of Benedict Arnold and Julius Rosenberg, while others, though less well known, are equally fascinating. From the American Revolution, through the Civil War and two World Wars, to the atomic age of the Manhattan Project, Sulick details the lives of those who have betrayed America's secrets. In each case he focuses on the motivations that drove these individuals to spy, their access and the secrets they betrayed, their tradecraft or techniques for concealing their espionage, their exposure and punishment, and the damage they ultimately inflicted on America's national security.Spying in Americaserves as the perfect introduction to the early history of espionage in America. Sulick's unique experience as a senior intelligence officer is evident as he skillfully guides the reader through these cases of intrigue, deftly illustrating the evolution of American awareness about espionage and the fitful development of American counterespionage leading up to the Cold War.
A Century of Repression
A Century of Repression offers an unprecedented and panoramic history of the use of the Espionage Act of 1917 as the most important yet least understood law threatening freedom of the press in modern American history. It details government use of the Act to control information about U.S. military and foreign policy during the two World Wars, the Cold War, and the War on Terror. The Act has provided cover for the settling of political scores, illegal break-ins, and prosecutorial misconduct.
Spies
This stunning book, based on KGB archives that have never come to light before, provides the most complete account of Soviet espionage in America ever written. In 1993, former KGB officer Alexander Vassiliev was permitted unique access to Stalin-era records of Soviet intelligence operations against the United States. Years later, living in Britain, Vassiliev retrieved his extensive notebooks of transcribed documents from Moscow. With these notebooks John Earl Haynes and Harvey Klehr have meticulously constructed a new, sometimes shocking, historical account. Along with general insights into espionage tactics and the motives of Americans who spied for Stalin,Spiesresolves specific, long-seething controversies. The book confirms, among many other things, that Alger Hiss cooperated with Soviet intelligence over a long period of years, that journalist I. F. Stone worked on behalf of the KGB in the 1930s, and that Robert Oppenheimer was never recruited by Soviet intelligence.Spiesalso uncovers numerous American spies who were never even under suspicion and satisfyingly identifies the last unaccounted for American nuclear spies. Vassiliev tells the story of the notebooks and his own extraordinary life in a gripping introduction to the volume.
Timing of cyber conflict
Nations are accumulating cyber resources in the form of stockpiles of zero-day exploits as well as other novel methods of engaging in future cyber conflict against selected targets. This paper analyzes the optimal timing for the use of such cyber resources. A simple mathematical model is offered to clarify how the timing of such a choice can depend on the stakes involved in the present situation, as well as the characteristics of the resource for exploitation. The model deals with the question of when the resource should be used given that its use today may well prevent it from being available for use later. The analysis provides concepts, theory, applications, and distinctions to promote the understanding strategy aspects of cyber conflict. Case studies include the Stuxnet attack on Iran's nuclear program, the Iranian cyber attack on the energy firm Saudi Aramco, the persistent cyber espionage carried out by the Chinese military, and an analogous case of economic coercion by China in a dispute with Japan. The effects of the rapidly expanding market for zero-day exploits are also analyzed. The goal of the paper is to promote the understanding of this domain of cyber conflict to mitigate the harm it can do, and harness the capabilities it can provide.
THE DANGERS OF SURVEILLANCE
From the Fourth Amendment to George Orwell's Nineteen Eighty-Four, and from the Electronic Communications Privacy Act to films like Minority Report and The Lives of Others, our law and culture are full of warnings about state scrutiny of our lives. These warnings are commonplace, but they are rarely very specific. Other than the vague threat of an Orwellian dystopia, as a society we don't really know why surveillance is bad and why we should be wary of it. To the extent that the answer has something to do with \"privacy,\" we lack an understanding of what \"privacy\" means in this context and why it matters. We've been able to live with this state of affairs largely because the threat of constant surveillance has been relegated to the realms of science fiction and failed totalitarian states.
Executive Secrets
A HISTORY BOOK CLUB SELECTION With a Foreword by Mark Bowden , author of Black Hawk Down
Spying in America
Can you keep a secret? Maybe you can, but the United States government cannot. Since the birth of the country, nations large and small, from Russia and China to Ghana and Ecuador, have stolen the most precious secrets of the United States. Written by Michael Sulick, former director of CIA's clandestine service, Spying in America presents a history of more than thirty espionage cases inside the United States. These cases include Americans who spied against their country, spies from both the Union and Confederacy during the Civil War, and foreign agents who ran operations on American soil. Some of the stories are familiar, such as those of Benedict Arnold and Julius Rosenberg, while others, though less well known, are equally fascinating. From the American Revolution, through the Civil War and two World Wars, to the atomic age of the Manhattan Project, Sulick details the lives of those who have betrayed America's secrets. In each case he focuses on the motivations that drove these individuals to spy, their access and the secrets they betrayed, their tradecraft or techniques for concealing their espionage, their exposure and punishment, and the damage they ultimately inflicted on America's national security. Spying in America serves as the perfect introduction to the early history of espionage in America. Sulick's unique experience as a senior intelligence officer is evident as he skillfully guides the reader through these cases of intrigue, deftly illustrating the evolution of American awareness about espionage and the fitful development of American counterespionage leading up to the Cold War.
THE LEAKY LEVIATHAN: WHY THE GOVERNMENT CONDEMNS AND CONDONES UNLAWFUL DISCLOSURES OF INFORMATION
The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice. This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an alternative theory of leaking. The executive branch's \"leakiness\" is often taken to be a sign of organizational failure. The Article argues it is better understood as an adaptive response to external liabilities (such as the mistrust generated by presidential secret keeping and media manipulation) and internal pathologies (such as overclassification and bureaucratic fragmentation) of the modern administrative state. The leak laws are so rarely enforced not only because it is hard to punish violators, but also because key institutional actors share overlapping interests in maintaining a permissive culture of classified information disclosures. Permissiveness does not entail anarchy, however, as a nuanced system of informal social controls has come to supplement, and all but supplant, the formal disciplinary scheme. In detailing these claims, the Article maps the rich sociology of governmental leak regulation and explores a range of implications for executive power, national security, democracy, and the rule of law.
The Impact of China on Cybersecurity: Fiction and Friction
Exaggerated fears about the paralysis of digital infrastructure and the loss of competitive advantage contribute to a spiral of mistrust in U.S.-China relations. In every category of putative Chinese cyber threat, there are also considerable Chinese vulnerabilities and Western advantages. China has inadvertently degraded the economic efficiency of its networks and exposed them to foreign infiltration by prioritizing political information control over technical cyber defense. Although China also actively infiltrates foreign targets, its ability to absorb stolen data is questionable, especially at the most competitive end of the value chain, where the United States dominates. Similarly, China's military cyber capacity cannot live up to its aggressive doctrinal aspirations, even as its efforts to guide national information technology development create vulnerabilities that more experienced U.S. cyber operators can attack. Outmatched by the West, China is resorting to a strategy of international institutional reform, but it benefits too much from multistakeholder governance to pose a credible alternative. A cyber version of the stability-instability paradox constrains the intensity of cyber interaction in the U.S.-China relationship—and in international relations more broadly—even as lesser irritants continue to proliferate.