Journal articles on the topic 'United states - espionage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'United states - espionage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Arindiya, Ghina, and Dewi Triwahyuni. "CHINESE ESPIONAGE ACTIVITIES AGAINST THE UNITED STATES MILITARY INDUSTRY." Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 7, no. 1 (July 1, 2024): 1108–19. http://dx.doi.org/10.34010/icobest.v7i.624.
Full textClarke, Duncan L. "Israel's Economic Espionage in the United States." Journal of Palestine Studies 27, no. 4 (1998): 20–35. http://dx.doi.org/10.2307/2538128.
Full textClarke, Duncan L. "Israel's Economic Espionage in the United States." Journal of Palestine Studies 27, no. 4 (July 1998): 20–35. http://dx.doi.org/10.1525/jps.1998.27.4.00p00037.
Full textKlehr, Harvey. "REFLECTIONS ON ESPIONAGE." Social Philosophy and Policy 21, no. 1 (January 2004): 141–66. http://dx.doi.org/10.1017/s0265052504211074.
Full textSmith, Michael M. "The Mexican Secret Service in the United States, 1910-1920." Americas 59, no. 1 (July 2002): 65–85. http://dx.doi.org/10.1353/tam.2002.0091.
Full textTerry, Patrick C. R. "“Don't Do as I Do”—The US Response to Russian and Chinese Cyber Espionage and Public International Law." German Law Journal 19, no. 3 (June 1, 2018): 613–26. http://dx.doi.org/10.1017/s207183220002280x.
Full textSmith, Lieutenant Commander Ursula, and Colonel Daniel J. Lecce. "Litigating National Security Cases under The United States Uniform Code of Military Justice." Journal of International Peacekeeping 20, no. 3-4 (August 17, 2016): 250–74. http://dx.doi.org/10.1163/18754112-02003007.
Full textAmusan, Lere, and Siphiwe Mchunu. "Adventure into Peacetime Intra-Alliance Espionage: Assessment of the America-Germany Saga." Lithuanian Foreign Policy Review 33, no. 1 (December 1, 2015): 64–82. http://dx.doi.org/10.1515/lfpr-2016-0010.
Full textWRÓBLEWSKA, Angelika. "SELECTED ADVANCED CYBER ESPIONAGE OPERATIONS." Cybersecurity & Cybercrime 1, no. 1 (March 31, 2021): 149–64. http://dx.doi.org/10.5604/01.3001.0053.8016.
Full textTerry, Patrick C. R. "“ABSOLUTE FRIENDS”: UNITED STATES ESPIONAGE AGAINST GERMANY AND PUBLIC INTERNATIONAL LAW." Revue québécoise de droit international 28, no. 2 (2015): 173. http://dx.doi.org/10.7202/1067720ar.
Full textAvery, Donald. "Secrets Between Different Kinds of Friends: Canada’s Wartime Exchange of Scientific Military Information with the United States and the USSR, 1940‑1945." Historical Papers 21, no. 1 (April 26, 2006): 225–53. http://dx.doi.org/10.7202/030955ar.
Full textFedoniuk, Serhii, and Serhii Maghdysiuk. "US-China Confrontation in Cyber Security." Історико-політичні проблеми сучасного світу, no. 45 (June 27, 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.
Full textSetzekorn, Eric. "The Contemporary Utility of 1930s Counterintelligence Prosecution Under the United States Espionage Act." International Journal of Intelligence and CounterIntelligence 29, no. 3 (April 6, 2016): 545–63. http://dx.doi.org/10.1080/08850607.2016.1121050.
Full textAdzanas, Adrian, and Bambang Ipto. "EDWARD SNOWDEN"S COMMUNICATION STRATEGY AGAINST INFORMATION DOMINATION GOVERNMENT OF THE UNITED STATES." dia 20, no. 01 (March 20, 2022): 121–35. http://dx.doi.org/10.30996/dia.v20i01.6295.
Full textSIBLEY, KATHERINE A. S. "Soviet Military-Industrial Espionage in the United States and the Emergence of an Espionage Paradigm in US-Soviet Relations, 1941-45." American Communist History 2, no. 1 (June 2003): 21–51. http://dx.doi.org/10.1080/1474389032000112582.
Full textHaynes, John Earl. "The Cold War Debate Continues: A Traditionalist View of Historical Writing on Domestic Communism and Anti-Communism." Journal of Cold War Studies 2, no. 1 (January 2000): 76–115. http://dx.doi.org/10.1162/15203970051032381.
Full textJonghaeng Yoon. "Recent Trends of Court's Decisions and Legislation on Economic Espionage in the United States." kangwon Law Review 44, no. ll (February 2015): 477–501. http://dx.doi.org/10.18215/kwlr.2015.44..477.
Full textHouse, Jonathan M. "American Spies: Espionage against the United States from the Cold War to the Present." History: Reviews of New Books 42, no. 4 (July 22, 2014): 129. http://dx.doi.org/10.1080/03612759.2014.903784.
Full textSegal, Adam. "The code not taken: China, the United States, and the future of cyber espionage." Bulletin of the Atomic Scientists 69, no. 5 (September 2013): 38–45. http://dx.doi.org/10.1177/0096340213501344.
Full textArredondo, Ricardo. "DIPLOMACIA, ESPIONAJE Y ORDEN MUNDIAL: EL CIERRE DE CONSULADOS DE CHINA Y ESTADOS UNIDOS." Revista española de derecho internacional 73, no. 1 (January 25, 2021): 35–56. http://dx.doi.org/10.17103/redi.73.1.2021.1.01.
Full textHaynes, John Earl, and Harvey Klehr. "Alexander Vassiliev's Notebooks and the Documentation of Soviet Intelligence Activities in the United States during the Stalin Era." Journal of Cold War Studies 11, no. 3 (July 2009): 6–25. http://dx.doi.org/10.1162/jcws.2009.11.3.6.
Full textKlehr, Harvey, and John Earl Haynes. "The First U.S.-Based Soviet Nuclear Spy: The Saga of Clarence Hiskey and Arthur Adams." Journal of Cold War Studies 25, no. 4 (2023): 53–69. http://dx.doi.org/10.1162/jcws_a_01170.
Full textHerken, Gregg. "Target Enormoz: Soviet Nuclear Espionage on the West Coast of the United States, 1942–1950." Journal of Cold War Studies 11, no. 3 (July 2009): 68–90. http://dx.doi.org/10.1162/jcws.2009.11.3.68.
Full textXiaofeng, Wang. "China’s Alternative Roles in Countering International Economic Cyber Espionage." China Quarterly of International Strategic Studies 02, no. 04 (January 2016): 549–68. http://dx.doi.org/10.1142/s2377740016500251.
Full textRovner, Joshua, and Tyler Moore. "Does the Internet Need a Hegemon?" Journal of Global Security Studies 2, no. 3 (July 1, 2017): 184–203. http://dx.doi.org/10.1093/jogss/ogx008.
Full textTuluș, Arthur. "The Condition of National Minorities in Eastern Europe in a Secret Cia Report From 1965." Eminak, no. 2(34) (July 1, 2021): 210–28. http://dx.doi.org/10.33782/eminak2021.2(34).529.
Full textSelyanin, Yaroslav. "The US confrontation with China through the prism of cyberspace." Russia and America in the 21st Century, no. 3 (2023): 0. http://dx.doi.org/10.18254/s207054760026344-5.
Full textPawlikowicz, Leszek. "Wykorzystanie radzieckich emigrantów doby détente w praktyce działań 1. Zarządu Głównego KGB i współczesne reminiscencje tego zjawiska. Casus Stanów Zjednoczonych Ameryki." Polityka i Społeczeństwo 20, no. 4 (2022): 233–48. http://dx.doi.org/10.15584/polispol.2022.4.16.
Full textGul, Noman, Fareed Ullah, and Azmat Ali Shah. "Sino-US Global Competitive Dynamics Post 9/11 and its Impacts on Pakistan's Security." Global Strategic & Securities Studies Review VI, no. II (June 30, 2021): 162–73. http://dx.doi.org/10.31703/gsssr.2021(vi-ii).16.
Full textOlmsted, Kathryn. "British and US Anticommunism Between the World Wars." Journal of Contemporary History 53, no. 1 (October 27, 2016): 89–108. http://dx.doi.org/10.1177/0022009416653458.
Full textTrasciatti, Mary Anne. "Kairos, Free Speech, and the Material Conditions of State Power in the United States: The Case of World War I." Journal for the History of Rhetoric 18, no. 2 (July 2015): 216–26. http://dx.doi.org/10.5325/jhistrhetoric.18.2.0216.
Full textUsdin, Steven. "The Face of Soviet Espionage in the United States during the Stalin Era: Vladimir Pravdin, “Man of Truth”." Journal of Cold War Studies 26, no. 2 (2024): 78–122. http://dx.doi.org/10.1162/jcws_a_01211.
Full textActon, James M. "Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War." International Security 43, no. 1 (August 2018): 56–99. http://dx.doi.org/10.1162/isec_a_00320.
Full textLi, Wei. "The Security Service for Chinese Central Leaders." China Quarterly 143 (September 1995): 814–27. http://dx.doi.org/10.1017/s030574100001506x.
Full textGoodman, Michael S. "Who Is Trying to Keep What Secret from Whom and Why? MI5-FBI Relations and the Klaus Fuchs Case." Journal of Cold War Studies 7, no. 3 (June 2005): 124–46. http://dx.doi.org/10.1162/1520397054377160.
Full textNeagu, Florentina Stefania, and Anca Savu. "The costs of cyberterrorism for the national economy: United States of America vs Egypt." Proceedings of the International Conference on Business Excellence 13, no. 1 (May 1, 2019): 983–93. http://dx.doi.org/10.2478/picbe-2019-0086.
Full textDYACHKOV, Ilya Vladimirovich. "UN SANCTIONS AGAINST THE DPRK: AN ASSESSMENT OF EFFICIENCY." Tambov University Review. Series: Humanities, no. 177 (2018): 173–79. http://dx.doi.org/10.20310/1810-0201-2018-23-177-173-179.
Full textBessonova, Maryna. "Canada and the Beginning of the Cold War: Modern Interpretations." American History & Politics Scientific edition, no. 8 (2019): 47–56. http://dx.doi.org/10.17721/2521-1706.2019.08.05.
Full textGilli, Andrea, and Mauro Gilli. "Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage." International Security 43, no. 3 (February 2019): 141–89. http://dx.doi.org/10.1162/isec_a_00337.
Full textLeaf, Jeffrey. "Bug Off." Mechanical Engineering 125, no. 10 (October 1, 2003): 56–59. http://dx.doi.org/10.1115/1.2003-oct-4.
Full textEhrenman, Gayle. "Not a Drop to Drink." Mechanical Engineering 125, no. 09 (September 1, 2003): 46–49. http://dx.doi.org/10.1115/1.2003-sep-1.
Full textChen, Ping-Hsun. "Trade Secret Protection of Genetically Engineered Rice Through the Economic Espionage Act: A Lesson from United States v. Weiqiang Zhang." Biotechnology Law Report 37, no. 4 (August 2018): 205–10. http://dx.doi.org/10.1089/blr.2018.29075.sz.
Full textManchester, Margaret Murányi. "The Corporate Dimension of the Cold War in Hungary: ITT and the Vogeler/Sanders Case Reconsidered." Journal of Cold War Studies 23, no. 2 (2021): 41–74. http://dx.doi.org/10.1162/jcws_a_00983.
Full textKhoday, Amar. "Seen in Its True Light: Desertion as a Pure Political Crime." Refuge: Canada's Journal on Refugees 30, no. 2 (November 19, 2014): 93–102. http://dx.doi.org/10.25071/1920-7336.39614.
Full textRosenfeldt, Niels Erik, and Julie Birkedal Riisbro. "En spionsag i 1930rnes København." Fund og Forskning i Det Kongelige Biblioteks Samlinger 55 (March 3, 2016): 317. http://dx.doi.org/10.7146/fof.v55i0.118919.
Full textKhalid, Dr Mohammed. "Emerging Challenges to India’s National Security: a Domestic Dimension." Scholars Journal of Arts, Humanities and Social Sciences 9, no. 11 (November 18, 2021): 600–603. http://dx.doi.org/10.36347/sjahss.2021.v09i11.006.
Full textBernstein, Seth. "Burying the Alliance: Interment, Repatriation and the Politics of the Sacred in Occupied Germany." Journal of Contemporary History 52, no. 3 (July 27, 2016): 710–30. http://dx.doi.org/10.1177/0022009416644665.
Full textKim, Ga-Bin, and Hyun-Goo Kang. "Studying Trends in Domestic and International News Reports on Industrial Espionage through Big Data Analysis: Focusing on Comparison with the United States." Korean Journal of Industry Security 14 (January 2, 2024): 1–27. http://dx.doi.org/10.33388/kais.2024.14.s.001.
Full textCASIS. "Canadian Supercomputer Threat Assessment and Potential Responses." Journal of Intelligence, Conflict, and Warfare 2, no. 1 (May 17, 2019): 12. http://dx.doi.org/10.21810/jicw.v2i1.955.
Full textЕфремов, Андрей, and Andrey Efremov. "THE DEVELOPMENT OF THE USA LEGISLATION ON THE FIGHT AGAINST TERRORISM AFTER 11 SEPTEMBER 2001." Journal of Foreign Legislation and Comparative Law 3, no. 3 (July 10, 2017): 86–92. http://dx.doi.org/10.12737/article_593fc343c391e2.71878517.
Full text