Query Result Set
Skip Navigation Links
   ActiveUsers:1351Hits:18701771Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
ESPIONAGE (88) answer(s).
 
12345Next
SrlItem
1
ID:   145587


Aesop’s wolves: the deceptive appearance of espionage and attacks in cyberspace / Brantly, Aaron F   Journal Article
Brantly, Aaron F Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Appearances in cyberspace are deceptive and problematic. Deception in the cyber domain poses an immensely difficult challenge for states to differentiate between espionage activities in cyberspace and cyber attacks. The inability to distinguish between cyber activities places US cyber infrastructure in a perilous position and increases the possibility of a disproportionate or inadequate response to cyber incidents. This paper uses case analysis to examine the characteristics associated with the tools and decisions related to cyber espionage and cyber attacks to develop a framework for distinction leveraging epidemiological models for combating disease.
Key Words Espionage  Cyberspace  Attack  Aesop’s Wolves 
        Export Export
2
ID:   037977


Air Spy: story of photo intelligence in world war II / Babington, Smith Constance 1957  Book
Babington, Smith Constance Book
0 Rating(s) & 0 Review(s)
Publication New York, Harber & Brothers Publishers, 1957.
Description xi, 266p.
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
011688355.3432/BAB 011688MainOn ShelfGeneral 
3
ID:   123884


An SDI for cyberspace? / Alexander, David   Journal Article
Alexander, david Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract In this article, the author discusses strategic defense initiative for cyberspace citing reference to an address delivered by U.S. President Barack Obama who warned people of consequences of cyber-attacks. Also discussed is an announcement made by the cyber security company Mandiant Corp. accusing China of a sponsored campaigns of cyber-espionage.
        Export Export
4
ID:   042496


Aquarium: career and defection of a Soviet military spy / Suvarov, Viktor 1985  Book
Suvarov, Viktor Book
0 Rating(s) & 0 Review(s)
Publication London, Hamish Hamilton, 1985.
Description 249p.
Standard Number 0241115450
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
025892355.3432/SUV 025892MainOn ShelfGeneral 
5
ID:   032344


Art of spying / Altavilla, Enrico 1965  Book
Altavilla, Enrico Book
0 Rating(s) & 0 Review(s)
Publication London, Robert Hale, 1965.
Description 191p.
Key Words Espionage  Spies 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
002018327.12/ALT 002018MainOn ShelfGeneral 
6
ID:   043411


Civil liberties and the constitution: cases and commentaries / Barker, Lucius J; Barker, Twiley W 1970  Book
Barker, Lucius J Book
0 Rating(s) & 0 Review(s)
Publication Englewood Cliffs, Prentice-Hall, 1970.
Description vii, 471p.
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
004881323/BAR 004881MainOn ShelfGeneral 
7
ID:   038295


Codes and ciphers / Peter Way 1977]  Book
Way Peter Book
0 Rating(s) & 0 Review(s)
Publication London, Aldus Books Limited, 1977.
Description 144p
Key Words Intelligence  Espionage  Secret Service  Ciphers  Code Names  Cvyptography 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
016876327.12/WAY 016876MainOn ShelfGeneral 
8
ID:   192044


Contest Copycats: Adversarial Duplication of Effort in Contests / Send, Jonas   Journal Article
Send, Jonas Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Participants in an innovation contest may steal their opponents’ ideas to enhance their chance of winning. To model this, I introduce the ability to copy another player’s effort in a Tullock contest between two players. I characterise the unique equilibrium in this game dependent on the cost of copying and one of the players’ productivity advantage. If the cost of copying is low, the less productive player is more likely to win the contest. The model’s comparative statics have important implications for governments who subsidise firms in contests and for contest designers.
Key Words Espionage  Imitation  Innovation Contest  Tullock Contest 
        Export Export
9
ID:   111149


Cyber war will not take place / Rid, Thomas   Journal Article
Rid, Thomas Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract For almost two decades, experts and defense establishments the world over have been predicting that cyber war is coming. But is it? This article argues in three steps that cyber war has never happened in the past, that cyber war does not take place in the present, and that it is unlikely that cyber war will occur in the future. It first outlines what would constitute cyber war: a potentially lethal, instrumental, and political act of force conducted through malicious code. The second part shows what cyber war is not, case-by-case. Not one single cyber offense on record constitutes an act of war on its own. The final part offers a more nuanced terminology to come to terms with cyber attacks. All politically motivated cyber attacks are merely sophisticated versions of three activities that are as old as warfare itself: sabotage, espionage, and subversion.
Key Words Espionage  Cyber Security  Information Operations  Subversion  Cyber War  Sabotage 
Stuxnet 
        Export Export
10
ID:   107766


Cybercrime and espionage: an analysis of subversive multivector threats / Gragido, Will; Pirc, John; Rogers, Russ (ed) 2011  Book
Gragido, Will Book
0 Rating(s) & 0 Review(s)
Publication Amsterdam, Elsevier, 2011.
Description xi, 254p.
Standard Number 9781597596131, hbk
Key Words Security  Espionage  Cyber Security  Cyber War  Cybercrime 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
056256364.168/GRA 056256MainOn ShelfGeneral 
11
ID:   038013


Debatable land: study of the motives of spies in two ages / Burn, Michael 1970  Book
Burn, Michael Book
0 Rating(s) & 0 Review(s)
Publication London, Hamish Hamilton, 1970.
Description x, 285p.
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
005011327.12/BUR 005011MainOn ShelfGeneral 
12
ID:   032623


Dirty work: the CIA in western Europe / Agee, Philip (ed); Louis Wolf (ed) 1978  Book
Agee, Philip Book
0 Rating(s) & 0 Review(s)
Publication London, Zed Press, 1978.
Description 318p
Standard Number 0862320453
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
020515327.1273040/AGE 020515MainOn ShelfGeneral 
13
ID:   082241


East German espionage in the era of detente / Gieseke, Jens   Journal Article
Gieseke, Jens Journal Article
0 Rating(s) & 0 Review(s)
Publication 2008.
Summary/Abstract East Germany was one of the main actors in Cold War military and security policy intelligence. Due to the opening of the archives of the Ministry for State Security (Stasi) of the German Democratic Republic it is possible today to analyse methods and goals of the East German civil and military intelligence services on this field in more detail. The article summarises the state of research on staff and sources of these services. Based on this information, main directions and operational fields are exemplified for military and international strategic intelligence in the era of d tente of the 1970s. Contents and quality of intelligence results are focused with respect to their potential influence on East German and Warsaw Pact (i.e. Soviet) decision-making processes.
Key Words Espionage  Detente  East Germany  Stasi  Cold War 
        Export Export
14
ID:   134433


End of intelligence: espionage and state of power in the information age / Tucker, David 2014  Book
Tucker, David Book
0 Rating(s) & 0 Review(s)
Publication Stanford, Stanford University Press, 2014.
Description 241p.Pbk
Contents Includes bibliographical references and index
Standard Number 9780804792653
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
057935327.12/TUC 057935MainOn ShelfGeneral 
15
ID:   038196


Enemy in the shadows: world of spies and spying / Gelb, Norman 1976  Book
Gelb, Norman Book
0 Rating(s) & 0 Review(s)
Publication London, Luscompe, 1976.
Description 157p.
Standard Number 0860020819
Key Words Espionage  Spies 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
015911327.12/GEL 015911MainOn ShelfGeneral 
16
ID:   032358


Espionage and Submission in an Industrial Society / Hamilton, Peter 1967  Book
Hamilton, Peter Book
0 Rating(s) & 0 Review(s)
Publication London, Hutchinson and Co Ltd, 1967.
Description xvii, 230p
Key Words Espionage  Spies  Secret Service 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
000843331.894/HAM 000843MainOn ShelfGeneral 
17
ID:   146570


Espionage, intelligence and exploitation in the digital age: concurrent manifestations of the cyber zeitgeist / Gupta, Ashish   Journal Article
Gupta, Ashish Journal Article
0 Rating(s) & 0 Review(s)
Key Words Intelligence  Espionage  Exploitation  Digital Age  Cyber Zeitgeist 
        Export Export
18
ID:   016755


Espionage: Double agent / Smolowe Jill March 7, 1994  Article
Smolowe Jill Article
0 Rating(s) & 0 Review(s)
Publication March 7, 1994.
Description 28-34
        Export Export
19
ID:   151106


Ethical defense of treason by means of espionage / Hatfield, Joseph M   Journal Article
Hatfield, Joseph M Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This essay argues that treason by means of espionage is ethically justified when six factors are present, two of which are: that the political community being betrayed fails to secure for its citizens basic human rights and other means of peaceful or otherwise lawful protest are unavailable. The paper begins by analyzing the application of several theories of ethics to treason, including: consequentialism, deontology, the Just War tradition, and Michael Walzer’s influential concept of ‘dirty hands.’ It then criticizes these points of view and offers an account of jus ad proditione per intelligentia (just treason by means of espionage) based upon Aristotelian thinking about ethics and politics.
Key Words Treason  Ethics  Espionage  Just War  Virtue Ethics 
        Export Export
20
ID:   026683


Fifth Horseman / Collins, Larry; Lapierre, Dominique 1981  Book
Collins, Larry Book
0 Rating(s) & 0 Review(s)
Publication New Delhi, Vikas Publishing, 1981.
Description 403p.
Standard Number 0706913442
Key Words Intelligence Service  Espionage 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
019228327.12/COL 019228MainOn ShelfGeneral 
12345Next