Auswahl der wissenschaftlichen Literatur zum Thema „United states - espionage“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "United states - espionage" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "United states - espionage"
Arindiya, Ghina, und Dewi Triwahyuni. „CHINESE ESPIONAGE ACTIVITIES AGAINST THE UNITED STATES MILITARY INDUSTRY“. Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 7, Nr. 1 (01.07.2024): 1108–19. http://dx.doi.org/10.34010/icobest.v7i.624.
Der volle Inhalt der QuelleClarke, Duncan L. „Israel's Economic Espionage in the United States“. Journal of Palestine Studies 27, Nr. 4 (1998): 20–35. http://dx.doi.org/10.2307/2538128.
Der volle Inhalt der QuelleClarke, Duncan L. „Israel's Economic Espionage in the United States“. Journal of Palestine Studies 27, Nr. 4 (Juli 1998): 20–35. http://dx.doi.org/10.1525/jps.1998.27.4.00p00037.
Der volle Inhalt der QuelleKlehr, Harvey. „REFLECTIONS ON ESPIONAGE“. Social Philosophy and Policy 21, Nr. 1 (Januar 2004): 141–66. http://dx.doi.org/10.1017/s0265052504211074.
Der volle Inhalt der QuelleSmith, Michael M. „The Mexican Secret Service in the United States, 1910-1920“. Americas 59, Nr. 1 (Juli 2002): 65–85. http://dx.doi.org/10.1353/tam.2002.0091.
Der volle Inhalt der QuelleTerry, Patrick C. R. „“Don't Do as I Do”—The US Response to Russian and Chinese Cyber Espionage and Public International Law“. German Law Journal 19, Nr. 3 (01.06.2018): 613–26. http://dx.doi.org/10.1017/s207183220002280x.
Der volle Inhalt der QuelleSmith, Lieutenant Commander Ursula, und Colonel Daniel J. Lecce. „Litigating National Security Cases under The United States Uniform Code of Military Justice“. Journal of International Peacekeeping 20, Nr. 3-4 (17.08.2016): 250–74. http://dx.doi.org/10.1163/18754112-02003007.
Der volle Inhalt der QuelleAmusan, Lere, und Siphiwe Mchunu. „Adventure into Peacetime Intra-Alliance Espionage: Assessment of the America-Germany Saga“. Lithuanian Foreign Policy Review 33, Nr. 1 (01.12.2015): 64–82. http://dx.doi.org/10.1515/lfpr-2016-0010.
Der volle Inhalt der QuelleWRÓBLEWSKA, Angelika. „SELECTED ADVANCED CYBER ESPIONAGE OPERATIONS“. Cybersecurity & Cybercrime 1, Nr. 1 (31.03.2021): 149–64. http://dx.doi.org/10.5604/01.3001.0053.8016.
Der volle Inhalt der QuelleTerry, Patrick C. R. „“ABSOLUTE FRIENDS”: UNITED STATES ESPIONAGE AGAINST GERMANY AND PUBLIC INTERNATIONAL LAW“. Revue québécoise de droit international 28, Nr. 2 (2015): 173. http://dx.doi.org/10.7202/1067720ar.
Der volle Inhalt der QuelleDissertationen zum Thema "United states - espionage"
Ritchey, David (David Benjamin. „George Washington's Development as an Espionage Chief“. Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc500803/.
Der volle Inhalt der QuelleMayo-Bobee, Dinah. „Espionage and Treason in the Early Republic“. Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/739.
Der volle Inhalt der QuelleSearle, Nicola C. „The economics of trade secrets : evidence from the Economic Espionage Act“. Thesis, University of St Andrews, 2010. http://hdl.handle.net/10023/1632.
Der volle Inhalt der QuellePrather, Michael S. „George Washington, America's first director of military intelligence“. Thesis, Springfield, Va. : Available from National Technical Information Service, 2002. http://handle.dtic.mil/100.2/ADA407555.
Der volle Inhalt der QuelleMentor(s): John B. Matthews, David A. Kelley. Includes bibliographical references (p. 52-54). Also available online.
Gaspard, Jules. „The origins and expansion of counter-espionage in America : from the Revolutionary War to the Progressive Era“. Thesis, University of Warwick, 2016. http://wrap.warwick.ac.uk/93142/.
Der volle Inhalt der QuelleAmundson, Ryan Lo Clarence Y. H. „The ethical resister's last resort news coverage over the allegations of a national security whistleblower /“. Diss., Columbia, Mo. : University of Missouri--Columbia, 2009. http://hdl.handle.net/10355/6583.
Der volle Inhalt der QuelleRossodivito, Anthony M. „The Struggle Against Bandits: The Cuban Revolution and Responses to CIA-Sponsored Counter-Revolutionary Activity, 1959-1963“. UNF Digital Commons, 2014. http://digitalcommons.unf.edu/etd/508.
Der volle Inhalt der QuelleUram, Derek Andrew. „Covert action : a useful tool for United States foreign policy?“ 2005. http://hdl.handle.net/1828/781.
Der volle Inhalt der QuelleSquadrans, Lyvia Spregacinere. „O Estado de Vigilância de Exceção dos Estados Unidos: a espionagem aos aliados“. Master's thesis, 2017. http://hdl.handle.net/10316/82464.
Der volle Inhalt der QuelleO presente trabalho tem como objetivo mostrar o porquê dos Estados Unidos investigar e interceptar ligações, e-mails e mensagens, de seus próprios aliados, uma vez que eles não apresentariam ameaça direta à segurança do país, através de uma política de vigilância fortalecida no pós-11 de setembro e pós-criação do Ato Patriota, em que a Agência de Segurança Nacional (NSA) teve suas capacidades aumentadas e legitimadas pelo Congresso estadunidense. Para isso, o trabalho examina os conceitos de inimigo e medo, usando para tal, a abordagem da Escola de Copenhague e o seu conceito de securitização, que tem suas origens no construtivismo, e concorda que as ameaças são socialmente construídas através do chamado Ato de Fala, que consiste em discursos e documentos de líderes. Sendo assim, a linguagem é algo fundamental no processo de securitização, bem como a aceitação da audiência, em que os receptores dessa mensagem aceitam que medidas emergenciais sejam tomadas em casos de uma ameaça eminente. É nesse sentido que o trabalho estuda a construção do inimigo, o terrorismo, no pós-11 de setembro, realizada pelo governo dos EUA, que justifica suas ações exepcionais, que em muitos casos vão contra os direitos dos cidadãos, em detrimento da segurança. O Ato Patriota se configura como uma dessas medidas excepcionais, que levou, junto com outros dispositivos legais, à um aumento das capacidades de inteligência do governo estadunidense e, em consequência, a uma vigilância em massa, exposta em 2013 por Edward Snowden, ex-agente da NSA. O trabalho analisa minuciosamente tais documentos confidenciais da política de inteligência dos EUA no pós-11 de setembro, bem como a história da NSA, desde sua criação durante a Guerra Fria, apresentando as estruturas e leis associadas, para mostrar a evolução da agência e da importância dada à Comunidade de Inteligência estadunidense. Por fim, debate a ambiguidade da política de vigilância dos Estados Unidos, que espionam os próprios aliados, principalmente os europeus, que ajudam na inteligência contra o terrorismo e, através do conceito de securitização, nos leva a conclusão de que através do discurso da segurança os EUA tratam os aliados como se fossem ‘inimigos’, numa cultura do medo construída após os atentados terroristas.
The present paper aims to present why the United States investigates and intercepts telephone calls, e-mails and messages from its own allies, since they do not present a direct threat to the security of the country, through a policy of surveillance strengthened in the post September 11 and post-creation of the Patriot Act, in which the National Security Agency (NSA) had its capabilities increased and legitimized by the US Congress. So, the paper examines the concepts of enemy and fear using the approach of the Copenhagen School and its concept of securitization, which has its origins in constructivism, and agrees that threats are socially constructed through the so-called Act of Speech, which consists of speeches and documents of leaders. Thus, language is fundamental to the securitization process, as well as the acceptance of the audience, in which the recipients of this message accept that emergency measures are taken in cases of eminent threat. In this sense, the paper studies the construction of the enemy, the terrorism, in the post-September 11, executed by the US government, which justifies its exceptional actions, which in many cases goes against the rule of law, to the detriment of security. The Patriot Act is one of these exceptional measures, which led, along with other legal provisions, to an increase in US government intelligence capabilities and, consequently, to mass surveillance, exposed in 2013 by Edward Snowden, Agent of the NSA. The paper thoroughly analyzes such confidential US intelligence policy documents post-9/11, as well as the history of the NSA since its inception during the Cold War, presenting the structures and associated laws, to show the evolution of the agency and the Importance to the American Intelligence Community. Finally, it discusses the ambiguity of US surveillance policy, which spies on their allies, specially the Europeans, who help in intelligence against terrorism and, through the concept of securitization, leads us to the conclusion that through the speech of Security the United States treat their allies as “enemies”, on a culture of scare built after the terrorist’s attacks.
Bücher zum Thema "United states - espionage"
Goldberg, Joe. Secret wars: An espionage story. Charleston, South Carolina]: [CreateSpace Publishing], 2014.
Den vollen Inhalt der Quelle findenRositzke, Harry August. The CIA's secret operations: Espionage, counterespionage, and covert action. Boulder: Westview Press, 1988.
Den vollen Inhalt der Quelle findenSpying: The modern world of espionage. Brookfield, Conn: Twenty-first Century Books, 2002.
Den vollen Inhalt der Quelle findenHerbig, Katherine L. Espionage against the United States by American citizens, 1947-2001. Monterey, CA: Defense Personnel Security Research Center, 2002.
Den vollen Inhalt der Quelle findenJr, Rustmann F. W. CIA, Inc.: Espionage and the craft of business intelligence. Washington, D.C: Brassey's, 2002.
Den vollen Inhalt der Quelle findenHaapiseva-Hunter, Jane. Israeli techno crimes in the United States. Kingston, Ont., Canada: Near East Cultural and Educational Foundation of Canada, 1988.
Den vollen Inhalt der Quelle findenIntelligence, United States Congress House Permanent Select Committee on. Report of investigation: The Aldrich Ames espionage case. Washington: U.S. G.P.O., 1994.
Den vollen Inhalt der Quelle findenSontag, Sherry. Blind man's bluff: The untold story of American submarine espionage. New York: HarperPaperbacks, 1999.
Den vollen Inhalt der Quelle findenWright, Claudia. Spy, steal, and smuggle: Israel's special relationship with the United States. Belmont, Mass: AAUG Press, 1986.
Den vollen Inhalt der Quelle findenUS GOVERNMENT. Economic Espionage Act of 1996. [Washington, D.C.?: U.S. G.P.O., 1996.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "United states - espionage"
Richelson, Jeffrey T. „Superpower Espionage“. In A Century of Spies, 256–71. Oxford University PressNew York, NY, 1995. http://dx.doi.org/10.1093/oso/9780195073911.003.0016.
Der volle Inhalt der QuelleGaddis, John Lewis. „Intelligence, Espionage, and Cold War History“. In The United States and the End Of the Cold War, 87–104. Oxford University PressNew York, NY, 1992. http://dx.doi.org/10.1093/oso/9780195052015.003.0005.
Der volle Inhalt der QuelleLewis, Margaret K. „HOW CAN THE UNITED STATES PROTECT ITS INTELLECTUAL PROPERTY FROM CHINA’S ESPIONAGE?“ In The China Questions 2, 265–73. Harvard University Press, 2022. http://dx.doi.org/10.2307/j.ctv2vr9cg3.32.
Der volle Inhalt der QuelleStruthers, David M. „The Contours of Repression“. In The World in a City, 184–208. University of Illinois Press, 2019. http://dx.doi.org/10.5622/illinois/9780252042478.003.0009.
Der volle Inhalt der QuelleLewis, Margaret K. „29. How Can the United States Protect Its Intellectual Property from China’s Espionage?“ In The China Questions 2, 265–73. Harvard University Press, 2022. http://dx.doi.org/10.4159/9780674287495-030.
Der volle Inhalt der QuelleEngelman, Ralph, und Carey Shenkman. „“A Firm Hand Of Stern Repression”“. In A Century of Repression, 13–37. University of Illinois Press, 2022. http://dx.doi.org/10.5622/illinois/9780252044557.003.0002.
Der volle Inhalt der QuelleEngelman, Ralph, und Carey Shenkman. „Enter Hoover and Baldwin“. In A Century of Repression, 38–60. University of Illinois Press, 2022. http://dx.doi.org/10.5622/illinois/9780252044557.003.0003.
Der volle Inhalt der QuelleMacdonnell, Francis. „The Opening Alarm“. In Insidious Foes, 49–71. Oxford University PressNew York, NY, 1995. http://dx.doi.org/10.1093/oso/9780195092684.003.0004.
Der volle Inhalt der QuelleLonergan, Erica D., und Shawn W. Lonergan. „Patterns of Escalation in Cyberspace“. In Escalation Dynamics in Cyberspace, 108—C5P84. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197550885.003.0005.
Der volle Inhalt der QuelleFahrenthold, Stacy D. „Former Ottomans in the Ranks“. In Between the Ottomans and the Entente, 57–84. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190872137.003.0004.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "United states - espionage"
Sinichenko, Vladimir. „Sewing Company “Singer” in Russia and Eastern Siberia During the First World War“. In Irkutsk Historical and Economic Yearbook 2021. Baikal State University, 2021. http://dx.doi.org/10.17150/978-5-7253-3040-3.19.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "United states - espionage"
Herbig, Katherine L., und Martin F. Wiskoff. Espionage Against the United States by American Citizens 1947-2001. Fort Belvoir, VA: Defense Technical Information Center, Juli 2002. http://dx.doi.org/10.21236/ada411004.
Der volle Inhalt der QuelleMiller, Joan. Spies in America : German espionage in the United States, 1935-1945. Portland State University Library, Januar 2000. http://dx.doi.org/10.15760/etd.5463.
Der volle Inhalt der Quelle