Academic literature on the topic 'Secret service and espionage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secret service and espionage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secret service and espionage"
Kim, Byeong jun. "A study on the organizations and duty of Korean and British Intelligence agencies." Korean Association of Public Safety and Criminal Justice 32, no. 3 (September 30, 2023): 103–34. http://dx.doi.org/10.21181/kjpc.2023.32.3.103.
Full textSmith, Michael M. "The Mexican Secret Service in the United States, 1910-1920." Americas 59, no. 1 (July 2002): 65–85. http://dx.doi.org/10.1353/tam.2002.0091.
Full textBobylov, Yu. "Does Russia Need Establishing Foreign Economic Intelligence Service?" Voprosy Ekonomiki, no. 4 (April 20, 2003): 123–34. http://dx.doi.org/10.32609/0042-8736-2003-4-123-134.
Full textŚwierczek, Marek. "Working methods of the Russian secret services in the light of the Oleg Kulinich case." Przegląd Bezpieczeństwa Wewnętrznego 15, no. 29 (December 6, 2023): 291–322. http://dx.doi.org/10.4467/20801335pbw.23.031.18773.
Full textLeșcu, Artur. "The Russian Empire’s Intelligence and Counterintelligence Services – General Considerations." Romanian Military Thinking 2024, no. 1 (March 30, 2024): 222–29. http://dx.doi.org/10.55535/rmt.2024.1.13.
Full textLatkowska, Iwona. "Soviet espionage and anti-state activity in Corps District Command V Krakow in the interwar period. Selected examples." Prace Naukowe Uniwersytetu Humanistyczno-Przyrodniczego im. Jana Długosza w Częstochowie. Zeszyty Historyczne 19 (2021): 157–73. http://dx.doi.org/10.16926/zh.2021.19.08.
Full textMakarov, A. V., N. Yu Gusevskaya, and A. S. Petrov. "Counteraction to High Treason in Russian Legislation of the Second Half of the 19th — Early 20th Centuries." Nauchnyi dialog, no. 1 (January 27, 2021): 337–56. http://dx.doi.org/10.24224/2227-1295-2021-1-337-356.
Full textLeșcu, Artur. "Serviciile de spionaj și contraspionaj ale Imperiului Rus – de la origini până la Primul Război Mondial. Aspecte generale." Gândirea Militară Românească 2024, no. 1 (March 30, 2024): 228–35. http://dx.doi.org/10.55535/gmr.2024.1.13.
Full textVlasenko, V. M., and Е. А. Murashko. "COMPOSITION AND STRUCTURE OF THE SPECIAL INFORMATION SERVICE (based on Hnat Porokhivsky’s archive-investigative case materials)." Sums'ka Starovyna (Ancient Sumy Land), no. 56 (2020): 21–31. http://dx.doi.org/10.21272/starovyna.2020.56.2.
Full textLi, Wei. "The Security Service for Chinese Central Leaders." China Quarterly 143 (September 1995): 814–27. http://dx.doi.org/10.1017/s030574100001506x.
Full textDissertations / Theses on the topic "Secret service and espionage"
Ritchey, David (David Benjamin. "George Washington's Development as an Espionage Chief." Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc500803/.
Full textBlistène, Pauline. "Voir et faire voir le secret de l'État : fonctions et enjeux de la fiction d’espionnage contemporaine." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H219.
Full textWhat is the political, moral and philosophical value of “spy fiction”? This dissertation examines this question using an innovative methodology that combines an analysis of contemporary television series (Homeland, Le Bureau des Légendes) and interviews with intelligence practitioners (CIA, DGSE) along with entertainment professionals (showrunners, screenwriters). My thesis is that there is a change in the ontological and epistemic status of spy films and TV series due to the involvement of real spies in their creation. The political and philosophical importance of spy fiction manifests itself in the impact of spy fiction on the political and social reality: the “realism” of spy fiction that I define here departs from common conceptions of correspondence to reality and replaces it with an approach that locates agency at the heart of the analysis. This approach does not stipulate the blurring of fact and fiction, but instead reaffirms its importance as a hypothesis for the production and reception of cultural artifacts. In a context where the demand for information concerning clandestine activities of the state keeps growing, the interactions between intelligence and entertainment professionals allow the former to stage their own disclosure without revealing their real activities. Far from contributing to the abolition of the frontier of secrecy, such practices contribute to its displacement, thus allowing a renewal of secrecy under the appearance of transparency. State secrets are never revealed but only signified
Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040174.
Full textThis work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
Le, Voguer Gildas. "Secret et démocratie dans l'Amérique de l'après-guerre : le contrôle parlementaire de l'activité des services de renseignement, 1947-1987." Orléans, 1992. http://www.theses.fr/1995ORLE1012.
Full textGenêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Electronic Thesis or Diss., Paris 4, 2010. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2010PA040174.pdf.
Full textThis work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
Gleghorn, Todd E. "Exposing the seams : the impetus for reforming U.S. counterintelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FGleghorn.pdf.
Full textThesis advisor(s): David C. Tucker, James Russell. Includes bibliographical references (p. 87-91). Also available online.
Davies, Philip H. J. "Organisational development of Britain's Secret Intelligence Service 1909-1979." Thesis, University of Reading, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363245.
Full textPARIS, XAVIER-LOUIS. "Le secret medical dans le service de sante de l'armee." Nantes, 1991. http://www.theses.fr/1991NANT030M.
Full textHarlow, Richard. "Two missions, one secret service : the value of the investigative mission." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5587.
Full textApproved for public release; distribution is unlimited
The dual missions of the United States Secret Service, investigations and protection, appear to be without relationship or value to the other, and as a result, support and attention for the investigative mission has waned. This lack of attention to investigations is dangerous for the Secret Service and for the country it serves. To make this argument, this thesis attempts to determine whether the investigative mission is actually important to the successful performance of its protective mission. Through the use of a hybrid research methodology, with quantitative and qualitative aspects, this thesis argues that the types of investigations performed by the Secret Service are not as important as the experiential learning, respite from the hyper-vigilance of protection, and surge capacity provided by the investigative mission. Since the investigative mission supports the protective mission in these three important ways, the Secret Service requires a robust, well-funded and substantial investigative mission to continue to properly provide protection to this nation's leaders.
Newswander, Chad B. "Agency of Crisis: The Chaos and Reordering of Presidential Security." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/31879.
Full textMaster of Arts
Books on the topic "Secret service and espionage"
Polmar, Norman. Spy book: The encyclopedia of espionage. New York: Random House, 1997.
Find full text(consultant), Macrakis Kristie, ed. World War II espionage. Minneapolis, MN: ABDO Publishing Company, 2016.
Find full textWest, Nigel. Games of intelligence: The classified conflictof international espionage. London: Weidenfeld and Nicolson, 1989.
Find full textSmith, Michael, 1952 May 1-, ed. The spying game: The secret history of British espionage. London: Politico's, 2003.
Find full textPlowden, Alison. The Elizabethan secret service. Hemel Hempstead, Hertfordshire: Harvester Wheatsheaf, 1991.
Find full textPiekałkiewicz, Janusz. World history of espionage: Agents, systems, operations. Washington, D.C: National Intelligence Book Center, 1998.
Find full textBook chapters on the topic "Secret service and espionage"
Wippl, Joseph W. "Observations on successful espionage." In Secret Intelligence, 28–37. 2nd ed. London: Routledge, 2019. http://dx.doi.org/10.4324/9780429029028-5.
Full textUsborne, Richard. "Our Secret Service." In Special Operations, 224–31. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003206613-19.
Full textGagné, Michel Jacques. "The secret cleaning service." In Thinking Critically About the Kennedy Assassination, 331–50. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003222460-18.
Full textGreen, John. "Münzenberg’s British Secret Service Files." In Willi Münzenberg, 254–67. 1 Edition. | New York : Routledge, 2020. | Series: Routledge studies in radical history and politics: Routledge, 2019. http://dx.doi.org/10.4324/9780429326035-15.
Full textDanylenko, Andrii. "On the Caliph's Secret Service." In Portraits of Medieval Europe, 800–1400, 73–79. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003318972-7.
Full textMulvenon, James. "Economic Espionage and Trade Secret Theft Cases in the US." In China’s Quest for Foreign Technology, 292–306. Milton Park, Abingdon, Oxon ; New York, NY: Routledge, 2021. |: Routledge, 2020. http://dx.doi.org/10.4324/9781003035084-23.
Full textIordanou, Ioanna. "Venice’s Secret Agents." In Venice's Secret Service, 158–89. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198791317.003.0005.
Full text"8 The Coyote, the Roadrunner, and the Reds under the Bed: Communist Espionage and Subversion." In Secret Service, 218–68. University of Toronto Press, 2012. http://dx.doi.org/10.3138/9781442662377-010.
Full textOtto, Heilbrunn. "A Classic in Espionage: The ‘Red Orchestra’, 1941–43." In The Soviet Secret Services, 21–32. Routledge, 2020. http://dx.doi.org/10.4324/9781003103158-3.
Full textPiekarz, Agnieszka. "Characteristics and Activities of the US Secret Service." In Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business, 293–303. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1031-4.ch017.
Full textConference papers on the topic "Secret service and espionage"
Jalil, Juriah Abd. "Addressing the Threats of Online Theft of Trade Secret and Cyber Espionage in Malaysia: The Legal Landscape." In 2018 6th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2018. http://dx.doi.org/10.1109/citsm.2018.8674061.
Full textMiteva, Boryana. "Bulgarian scientific and technical intelligence in Japan during the Cold War." In 9th International e-Conference on Studies in Humanities and Social Sciences. Center for Open Access in Science, Belgrade - Serbia, 2023. http://dx.doi.org/10.32591/coas.e-conf.09.06055m.
Full textNamin, A. S., Ruizhong Wei, Weiming Shen, and H. Ghenniwa. "Applying secret sharing schemes to service reputation." In Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design. IEEE, 2005. http://dx.doi.org/10.1109/cscwd.2005.194269.
Full textZidaru, Marian. "�THE TRUST� STALIN�S OWN SECRET SERVICE ORGANISATIONS." In 9th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2022. SGEM WORLD SCIENCE, 2022. http://dx.doi.org/10.35603/sws.iscss.2022/s01.006.
Full textKe, Chenyutao, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, and Kouichi Sakurai. "Cross-group Secret Sharing for Secure Cloud Storage Service." In IMCOM '16: The 10th International Conference on Ubiquitous Information Management and Communication. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2857546.2857610.
Full textBissoli, Andrea, and Fabrizio d'Amore. "Authentication as A Service Based on Shamir Secret Sharing." In 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC). IEEE, 2021. http://dx.doi.org/10.1109/iscsic54682.2021.00072.
Full textCheng, Qi, Xiaopu Ma, Qin-Yun Xu, and Yun-Qiu Chen. "A Family of Non-Representable Secret Sharing Matroids." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5304342.
Full textLee, Chih-Hung, Kun-Sheng Sun, Yun-Qiao Wang, Ji-Hwei Horng, and Chin-Chen Chang. "Secret Message CDMA Multiplexing via QR Codes." In ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3523181.3523189.
Full textGyongyosi, Laszlo, and Sandor Imre. "Quantum Informational Geometry for Secret Quantum Communication." In 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns (COMPUTATIONWORLD). IEEE, 2009. http://dx.doi.org/10.1109/computationworld.2009.58.
Full textChen, Zhuo. "Multi-Organization Key Agreement and Secret Sharing for CERS." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5303859.
Full textReports on the topic "Secret service and espionage"
Kwan, S., P. Garg, J. Gilroy, L. Esibov, J. Westhead, and R. Hall. Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG). RFC Editor, October 2003. http://dx.doi.org/10.17487/rfc3645.
Full text