Academic literature on the topic 'Secret service and espionage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secret service and espionage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secret service and espionage"

1

Kim, Byeong jun. "A study on the organizations and duty of Korean and British Intelligence agencies." Korean Association of Public Safety and Criminal Justice 32, no. 3 (September 30, 2023): 103–34. http://dx.doi.org/10.21181/kjpc.2023.32.3.103.

Full text
Abstract:
This study aims to find the cause of problems such as political intervention and human rights violations related to the National Intelligence Service in Korea. To this end, the organization and duty of Korean and British intelligence agencies were analyzed using literature review research methods. As a result of the analysis, the study identified that the problems related to the National Intelligence Service were caused by the obscurity of the regulation - ‘domestic security information’ - under the National Intelligence Service Act and the abuse of investigative power during intelligence activities. British intelligence agencies collect, analyze, and exploit foreign and domestic intelligence and military intelligence, and perform espionage and counter-espionage. The role of the Security Service(MI5) is to protect national security from threats such as terrorism and espionage and to gather secret intelligence on threats to national security. The Secret Intelligence Service(MI6) works secretly overseas to gather intelligence, which is referred to as espionage. The controversy related to the National Intelligence Service is expected to be reduced due to the revision of the National Intelligence Service Act in 2020. In addition to this, the study proposes to separate the National Intelligence Service into each agency according to its roles of counter-espionage and foreign espionage.
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Michael M. "The Mexican Secret Service in the United States, 1910-1920." Americas 59, no. 1 (July 2002): 65–85. http://dx.doi.org/10.1353/tam.2002.0091.

Full text
Abstract:
Throughout the era of the Mexican Revolution, the United States provided sanctuary for thousands of political exiles who opposed the regimes of Porfirio Díaz, Francisco Madero, Victoriano Huerta, and Venustiano Carranza. Persecuted enemies of Don Porfirio and losers in the bloody war of factions that followed the ouster of the old regime continued their struggle for power from bases of operation north of the international boundary in such places as San Francisco, Los Angeles, El Paso, San Antonio, New Orleans, and New York. As a consequence, Mexican regimes were compelled not only to combat their enemies on domestic battlefields but also to wage more subtle campaigns against their adversaries north of the Río Bravo. The weapons in this shadowy war included general intelligence gathering, surveillance, espionage, counter-espionage, and propaganda; the agency most responsible for these activities was the Mexican Secret Service.
APA, Harvard, Vancouver, ISO, and other styles
3

Bobylov, Yu. "Does Russia Need Establishing Foreign Economic Intelligence Service?" Voprosy Ekonomiki, no. 4 (April 20, 2003): 123–34. http://dx.doi.org/10.32609/0042-8736-2003-4-123-134.

Full text
Abstract:
The increasing role of foreign intelligence and industrial espionage in order to improve competitiveness of Russian business is noted in the article. In the author's view, Russia's WTO accession requires application of protective secret managing technologies. The establishment of a new Russian special service - the intelligence unit in the structure of the Ministry of Economic Development and Trade is proposed which will be able to perform important functions under conditions of Russia's growing integration in the world economy.
APA, Harvard, Vancouver, ISO, and other styles
4

Świerczek, Marek. "Working methods of the Russian secret services in the light of the Oleg Kulinich case." Przegląd Bezpieczeństwa Wewnętrznego 15, no. 29 (December 6, 2023): 291–322. http://dx.doi.org/10.4467/20801335pbw.23.031.18773.

Full text
Abstract:
The author analyses the case of the detention of Ukrainian Security Service officer Oleg Kulinich on suspicion of espionage for the Federal Security Service of the Russian Federation. On the basis of the analysis of the tasks posed to this Russian agent, he concludes that the modus operandi of Russian counterintelligence is diametrically opposed to the methods of Western services. The main difference is the shifting of the centre of gravity of operational activities from reconnaissance-information work to attempts at agentic seizure of control over enemy institutions, mainly civilian and military special services, and the realisation of intelligence infiltration by people with the same habitus as recruitment candidates. Drawing on the achievements of cognitive psychology and research in recent history, the author demonstrates that the Russian services have been using and refining these methods for more than 100 years.
APA, Harvard, Vancouver, ISO, and other styles
5

Leșcu, Artur. "The Russian Empire’s Intelligence and Counterintelligence Services – General Considerations." Romanian Military Thinking 2024, no. 1 (March 30, 2024): 222–29. http://dx.doi.org/10.55535/rmt.2024.1.13.

Full text
Abstract:
The Russian Empire was based, since the early years of the nineteenth century, mainly on military force, in the composition of which an important role was played by the accumulation of information on opponents and the fight against foreign espionage inside the country. Despite the central role attributed to these secret services, the Russian Empire did not have a specialized body in the field of military espionage. In this context, based on a vast and new Russian historiographical material, accumulated as a result of research by the National Archives of the Republic of Moldova, the author presents, by the method of analysis of historical documents, a perspective of the genesis, activity and results obtained by the Russian intelligence and counter-espionage services of the tsarist period.
APA, Harvard, Vancouver, ISO, and other styles
6

Latkowska, Iwona. "Soviet espionage and anti-state activity in Corps District Command V Krakow in the interwar period. Selected examples." Prace Naukowe Uniwersytetu Humanistyczno-Przyrodniczego im. Jana Długosza w Częstochowie. Zeszyty Historyczne 19 (2021): 157–73. http://dx.doi.org/10.16926/zh.2021.19.08.

Full text
Abstract:
The article attempts to present and analyze examples of espionage and anti-state activities, inspired by the services of the USSR and illegal communist environments. The area of their activity was limited to the territory of the District Command No. V Kraków, i.e. the provinces of Kraków, Silesia and parts of Kielce one, which also were under the supervision of the Independent Information Office, that was part of its structure. It was its duties that included regular inspections in garrisons or military units, observations of people suspected of espionage and, finally, liquidation of scandals with help of its own agent apparatus, police or gendarmerie. The article focuses on the efforts of Polish secret services and the security authorities cooperating with them in combating secret Soviet crime against the Republic of Poland.
APA, Harvard, Vancouver, ISO, and other styles
7

Makarov, A. V., N. Yu Gusevskaya, and A. S. Petrov. "Counteraction to High Treason in Russian Legislation of the Second Half of the 19th — Early 20th Centuries." Nauchnyi dialog, no. 1 (January 27, 2021): 337–56. http://dx.doi.org/10.24224/2227-1295-2021-1-337-356.

Full text
Abstract:
The problem of improving the criminal liability of the subjects of the Russian Empire at the end of the nineteenth century for espionage and spilling state secrets to a foreign state is considered. The relevance of the study is due to the importance of the problem under study for the effective functioning of the Russian state. The study is based on historical sources of a regulatory and legal nature and is interdisciplinary in nature. Particular attention is paid to the study of legal norms, the identification of the type and amount of punishments for the commission of espionage by Russian citizens and spilling the state secrets to a foreign state. It is indicated that in the second half of the 19th century, the intensity of intelligence of foreign secret services in the territory of the Russian Empire increased. It is noted that more and more often foreign powers involved Russian subjects in the process of obtaining Russian secrets. At the same time, the analysis of the sources made it possible to reveal a sufficient limitation of the institution of counteracting espionage and disclosure of state secrets to foreign states in the Russian Empire at the end of the 19th century. It is proved that it was precisely these phenomena at the end of the 19th and the beginning of the 20th centuries that determined the authorities’ desire to progressively improve legal mechanisms that counteract threats and challenges to national security.
APA, Harvard, Vancouver, ISO, and other styles
8

Leșcu, Artur. "Serviciile de spionaj și contraspionaj ale Imperiului Rus – de la origini până la Primul Război Mondial. Aspecte generale." Gândirea Militară Românească 2024, no. 1 (March 30, 2024): 228–35. http://dx.doi.org/10.55535/gmr.2024.1.13.

Full text
Abstract:
The Russian Empire was based, since the early years of the nineteenth century, mainly on military force, in the composition of which an important role was played by the accumulation of information on opponents and the fight against foreign espionage inside the country. Despite the central role attributed to these secret services, the Russian Empire did not have a specialized body in the field of military espionage. In this context, based on a vast and new Russian historiographical material, accumulated as a result of research by the National Archives of the Republic of Moldova, the author presents, by the method of analysis of historical documents, a perspective of the genesis, activity and results obtained by the Russian intelligence and counter-espionage services of the tsarist period.
APA, Harvard, Vancouver, ISO, and other styles
9

Vlasenko, V. M., and Е. А. Murashko. "COMPOSITION AND STRUCTURE OF THE SPECIAL INFORMATION SERVICE (based on Hnat Porokhivsky’s archive-investigative case materials)." Sums'ka Starovyna (Ancient Sumy Land), no. 56 (2020): 21–31. http://dx.doi.org/10.21272/starovyna.2020.56.2.

Full text
Abstract:
The lack of the scientific literature concerning the Intelligence Service of Romania (Special Information Service) is stated. Only some references to the activities of the Intelligence Service of Romania on the territory of Ukraine are mentioned in the isolated publications. The authors used the documents and materials from Hnat Porokhivsky’s archive-investigative case which is kept in the Sectoral State Archive of the Security Service of Ukraine. The materials mentioned above are representative and fill the gap in the issue concerning the structure of the Special Information Service of Romania and provide a certain indication about its composition. The fact that Hnat Porokhivsky was a colonel of the UNR Army and the leader of the Ukrainian military emigration in Romania is mentioned. Hnat Porokhivsky’s main biographical milestones, his socio-political and military activities are covered. His organizational skills, professional knowledge in the sphere of secret service, and counterespionage were used by the Intelligence Service of Romania. Not being a citizen of Romania, he made a valuable contribution to the process of the Romanian secret service development. The Special Information Service had a complicated multi-stage structure with the an extensive network of intelligence centers, sub-centers, rezidenturas, agents, and support divisions on the territories of both Romania and the Soviet Union on the eve of World War II. Different intelligence units of the Special Information Service of Romania operated on the occupied territories of Ukraine from 1941 to 1944. The central authorities and regional offices heads’ and staff members’ surnames (sometimes pseudonyms) are specified. From the authors’ point of view, the most promising studies are those ones of the Intelligence Service of Romania espionage, counterespionage and propagandistic activities, Ukrainian and Russian immigrants’ participation in this process, and Special Information Service cooperation with secret services of Germany and Japan. Keywords: intelligence (secret) service, Hnat Porokhivsky, rezidentura, Romania, Special Information Service, Ukrainian emigration, center.
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Wei. "The Security Service for Chinese Central Leaders." China Quarterly 143 (September 1995): 814–27. http://dx.doi.org/10.1017/s030574100001506x.

Full text
Abstract:
National leaders need security protection against political assassinations, espionage, terrorism and many other dangers, and therefore almost every country has a specialized organization to provide such protection. In the United States, the President is protected by the Secret Service of the Treasury Department, and in the Soviet Union, the Kremlin denizens were guarded by the Ninth Directorate of the KGB. The Chinese security system for the top leadership, consisting mainly of the Central Security Bureau in Zhongnanhai, is however distinctive in several respects. Institutionally it has a peculiarly complex set of arrangements which result in some puzzling divisions of responsibilities. It also relies heavily on a military detachment, Unit 8341. Above all, the Chinese central security apparatus can, and does, play a more active and indispensable political role than is common in other countries.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secret service and espionage"

1

Ritchey, David (David Benjamin. "George Washington's Development as an Espionage Chief." Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc500803/.

Full text
Abstract:
The American Revolution was a war of movement over great distances. Timely intelligence regarding the strength and location of the enemy was vital to the commanders on both sides. Washington gained his early experience in intelligence gathering in the wilderness during the French and Indian War. By the end of the American Revolution, Washington had become a skilled manager of intelligence. He sent agents behind enemy lines, recruited tory intelligence sources, questioned travelers for information, and initiated numerous espionage missions. Many heroic patriots gathered the intelligence that helped win the War for Independence. Their duties required many of them to pose as one of the enemy, and often incur the hatred of friends and neighbors. Some gave their lives in helping to establish the new American nation. It is possible that without Washington's intelligence service, American independence might not have been won.
APA, Harvard, Vancouver, ISO, and other styles
2

Blistène, Pauline. "Voir et faire voir le secret de l'État : fonctions et enjeux de la fiction d’espionnage contemporaine." Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H219.

Full text
Abstract:
Quelle est la valeur politique, morale et philosophique des fictions dites « d’espionnage » ? Nous examinons cette question à partir d’une méthodologie innovante mêlant analyse de séries télévisées contemporaines (Homeland, Le Bureau des Légendes) et enquêtes de terrain auprès des acteurs du renseignement (CIA, DGSE) et du divertissement (showrunners, scénaristes). La thèse que nous défendons est celle d’une modification du statut ontologique et épistémique des films ou séries d’espionnage en raison de l’engagement de véritables espions dans leur fabrication. L’importance politique et philosophique des fictions d’espionnage se manifeste par l’impact de ces fictions sur la réalité politique et sociale : le « réalisme » des fictions d’espionnage que nous définissons ici s’éloigne des conceptions communes de ressemblance avec le réel pour y substituer une approche qui met l’agentivité au cœur de l’analyse. Il ne s’agit pas de décréter l’effacement de la frontière entre fait et fiction mais au contraire d’en réaffirmer l’importance, comme hypothèse de production et de réception des œuvres. Dans un contexte où la demande d’information concernant les activités clandestines de l’État ne cesse de croître, les interactions entre professionnels du renseignement et du divertissement permettent aux premiers de mettre en scène leur propre dévoilement sans pour autant révéler leurs activités réelles. Ainsi, loin de concourir à l’abolition de la frontière du secret, de telles pratiques opèrent un déplacement de cette dernière : une reconduite du régime du secret sous l’apparence d’une mise en transparence. Le secret de l’État n’est jamais dévoilé, il est toujours signifié
What is the political, moral and philosophical value of “spy fiction”? This dissertation examines this question using an innovative methodology that combines an analysis of contemporary television series (Homeland, Le Bureau des Légendes) and interviews with intelligence practitioners (CIA, DGSE) along with entertainment professionals (showrunners, screenwriters). My thesis is that there is a change in the ontological and epistemic status of spy films and TV series due to the involvement of real spies in their creation. The political and philosophical importance of spy fiction manifests itself in the impact of spy fiction on the political and social reality: the “realism” of spy fiction that I define here departs from common conceptions of correspondence to reality and replaces it with an approach that locates agency at the heart of the analysis. This approach does not stipulate the blurring of fact and fiction, but instead reaffirms its importance as a hypothesis for the production and reception of cultural artifacts. In a context where the demand for information concerning clandestine activities of the state keeps growing, the interactions between intelligence and entertainment professionals allow the former to stage their own disclosure without revealing their real activities. Far from contributing to the abolition of the frontier of secrecy, such practices contribute to its displacement, thus allowing a renewal of secrecy under the appearance of transparency. State secrets are never revealed but only signified
APA, Harvard, Vancouver, ISO, and other styles
3

Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040174.

Full text
Abstract:
Ce travail aborde la question du renseignement militaire de la guerre de succession d’Autriche (1740) au traité de Paris (1763). Le renseignement militaire est d’abord replacé dans la réflexion stratégique de la période qui l’évoque peu tout en soulignent paradoxalement l’importance pour les armées. Les différentes sources de l’information militaire constituent la seconde partie. L’espion d’armée, figure méconnue de la période joue un rôle quotidien auprès des armées d’Ancien Régime. Situé à la marge de la société civile et de la sphère militaire, attiré par le gain mais aussi par le goût de l’aventure, une reconnaissance sociale ou incité par un patriotisme naissant, l’espion prend des risques pour satisfaire un commanditaire. La troisième partie s’intéresse au secret militaire, difficile à préserver et dévoilé dans une logique de réseau, à différentes échelles et selon des organisations plus ou moins complexes. L’espion s’inscrit dans un rapport personnel avec un supérieur dont il est le « client ». L’étude s’intéresse dans un dernier temps à la transmission et la protection du renseignement obtenu. Les risques sont divers (interception postale mais surtout espions ennemis). La conclusion pose la question de l’efficacité du renseignement militaire, peu décisif du fait des contraintes logistiques et de la méfiance généralisée sur les informations et sur les acteurs qui les collectent. Dans une période de structuration de l’armée et de centralisation du pouvoir politique, le renseignement militaire oppose un fonctionnement décentralisé. La nécessité d’une information fiable entraîne une militarisation des civils, transformant ces derniers en auxiliaires de renseignement
This work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
APA, Harvard, Vancouver, ISO, and other styles
4

Le, Voguer Gildas. "Secret et démocratie dans l'Amérique de l'après-guerre : le contrôle parlementaire de l'activité des services de renseignement, 1947-1987." Orléans, 1992. http://www.theses.fr/1995ORLE1012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)." Electronic Thesis or Diss., Paris 4, 2010. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2010PA040174.pdf.

Full text
Abstract:
Ce travail aborde la question du renseignement militaire de la guerre de succession d’Autriche (1740) au traité de Paris (1763). Le renseignement militaire est d’abord replacé dans la réflexion stratégique de la période qui l’évoque peu tout en soulignent paradoxalement l’importance pour les armées. Les différentes sources de l’information militaire constituent la seconde partie. L’espion d’armée, figure méconnue de la période joue un rôle quotidien auprès des armées d’Ancien Régime. Situé à la marge de la société civile et de la sphère militaire, attiré par le gain mais aussi par le goût de l’aventure, une reconnaissance sociale ou incité par un patriotisme naissant, l’espion prend des risques pour satisfaire un commanditaire. La troisième partie s’intéresse au secret militaire, difficile à préserver et dévoilé dans une logique de réseau, à différentes échelles et selon des organisations plus ou moins complexes. L’espion s’inscrit dans un rapport personnel avec un supérieur dont il est le « client ». L’étude s’intéresse dans un dernier temps à la transmission et la protection du renseignement obtenu. Les risques sont divers (interception postale mais surtout espions ennemis). La conclusion pose la question de l’efficacité du renseignement militaire, peu décisif du fait des contraintes logistiques et de la méfiance généralisée sur les informations et sur les acteurs qui les collectent. Dans une période de structuration de l’armée et de centralisation du pouvoir politique, le renseignement militaire oppose un fonctionnement décentralisé. La nécessité d’une information fiable entraîne une militarisation des civils, transformant ces derniers en auxiliaires de renseignement
This work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
APA, Harvard, Vancouver, ISO, and other styles
6

Gleghorn, Todd E. "Exposing the seams : the impetus for reforming U.S. counterintelligence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FGleghorn.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2003.
Thesis advisor(s): David C. Tucker, James Russell. Includes bibliographical references (p. 87-91). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Davies, Philip H. J. "Organisational development of Britain's Secret Intelligence Service 1909-1979." Thesis, University of Reading, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

PARIS, XAVIER-LOUIS. "Le secret medical dans le service de sante de l'armee." Nantes, 1991. http://www.theses.fr/1991NANT030M.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Harlow, Richard. "Two missions, one secret service : the value of the investigative mission." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5587.

Full text
Abstract:
CHDS State/Local
Approved for public release; distribution is unlimited
The dual missions of the United States Secret Service, investigations and protection, appear to be without relationship or value to the other, and as a result, support and attention for the investigative mission has waned. This lack of attention to investigations is dangerous for the Secret Service and for the country it serves. To make this argument, this thesis attempts to determine whether the investigative mission is actually important to the successful performance of its protective mission. Through the use of a hybrid research methodology, with quantitative and qualitative aspects, this thesis argues that the types of investigations performed by the Secret Service are not as important as the experiential learning, respite from the hyper-vigilance of protection, and surge capacity provided by the investigative mission. Since the investigative mission supports the protective mission in these three important ways, the Secret Service requires a robust, well-funded and substantial investigative mission to continue to properly provide protection to this nation's leaders.
APA, Harvard, Vancouver, ISO, and other styles
10

Newswander, Chad B. "Agency of Crisis: The Chaos and Reordering of Presidential Security." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/31879.

Full text
Abstract:
Crisis situations have the power to restructure knowledge, norms, rules and discourse. The status quo can be changed, transformed, and revolutionized through shocks to a system. These events often lead to chaos and reordering. Deflecting blame, assigning praise and guilt, transcending the situation, and corrective actions are secondary concerns when an organization is trying to change its core identity and epistemic reality. These shocks to the system provide a momentary break in time in which new discursive spaces open and become available. In particular, crisis situations that become marked by high probability/high consequence events enable organizations to establish new meaning. In these moments, a Foucauldian framework that focuses on power as production is able to illuminate certain aspects about crisis situations and crisis response. This thesis delves into the process of how external shocks created opportunities for an organization like the Secret Service to mold a crisis moment through the production of knowledge and meaning. To examine how the Secret Service responded to these shocks, this thesis examines a series of case studies ranging from the attempted assassination of Roland Reagan to the Oklahoma City bombing. In these moments, the Secret Service relied on its ability to create authoritative meaning, discipline the president, and make declarative statements about potential threats and safety precautions. In its ability to formulate these concepts, the president becomes tied to the Secret Serviceâ s apparatus of truth production. This allows the Secret Service to produce new meaning that disciplines presidential movement and action. Due to these conditions, the Service pivots on an unstable foundation, which allows it to reformulate and create new protective measures to protect the president in an ever changing environment.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Secret service and espionage"

1

Campbell, Duncan. Secret service. New York: Gloucester Press, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lloyd, Mark. The Guinness book of espionage. New York: Da Capo Press, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lloyd, Mark. The Guinness book of espionage. Enfield: Guinness, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Polmar, Norman. Spy book: The encyclopedia of espionage. New York: Random House, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

(consultant), Macrakis Kristie, ed. World War II espionage. Minneapolis, MN: ABDO Publishing Company, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

West, Nigel. Games of intelligence: The classified conflictof international espionage. London: Weidenfeld and Nicolson, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Michael, 1952 May 1-, ed. The spying game: The secret history of British espionage. London: Politico's, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Plowden, Alison. The Elizabethan secret service. Hemel Hempstead, Hertfordshire: Harvester Wheatsheaf, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1960-, Satō Masaru, ed. インテリジェンス武器なき戦争. Tōkyō: Gentōsha, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Piekałkiewicz, Janusz. World history of espionage: Agents, systems, operations. Washington, D.C: National Intelligence Book Center, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Secret service and espionage"

1

Wippl, Joseph W. "Observations on successful espionage." In Secret Intelligence, 28–37. 2nd ed. London: Routledge, 2019. http://dx.doi.org/10.4324/9780429029028-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Usborne, Richard. "Our Secret Service." In Special Operations, 224–31. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003206613-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gagné, Michel Jacques. "The secret cleaning service." In Thinking Critically About the Kennedy Assassination, 331–50. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003222460-18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Green, John. "Münzenberg’s British Secret Service Files." In Willi Münzenberg, 254–67. 1 Edition. | New York : Routledge, 2020. | Series: Routledge studies in radical history and politics: Routledge, 2019. http://dx.doi.org/10.4324/9780429326035-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Danylenko, Andrii. "On the Caliph's Secret Service." In Portraits of Medieval Europe, 800–1400, 73–79. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003318972-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mulvenon, James. "Economic Espionage and Trade Secret Theft Cases in the US." In China’s Quest for Foreign Technology, 292–306. Milton Park, Abingdon, Oxon ; New York, NY: Routledge, 2021. |: Routledge, 2020. http://dx.doi.org/10.4324/9781003035084-23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Iordanou, Ioanna. "Venice’s Secret Agents." In Venice's Secret Service, 158–89. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198791317.003.0005.

Full text
Abstract:
This chapter discusses the different types of secret agents whom the Venetian authorities employed for their intelligence pursuits. These were drawn from all strata of Venetian society. Representing the patriciate, Venetian ambassadors and governors acted as semi-professional informants whose intelligence-gathering activities were coterminous with the norms of diplomatic decorum. Venetian merchants from either the patriciate or the social order of the cittadini also offered their services as amateur intelligence gatherers, protected under the guise of their professional activity. For outright espionage missions, however, when the spy had to infiltrate foreign lands, the Ten handpicked run-of-the-mill mercenary spies who were willing to risk their lives for a cash reward, an official privilege, or a political favour. The chapter shows how the Council of Ten commodified the practice of intelligence-gathering and espionage and turned it into a business transaction between the government and the governed.
APA, Harvard, Vancouver, ISO, and other styles
8

"8 The Coyote, the Roadrunner, and the Reds under the Bed: Communist Espionage and Subversion." In Secret Service, 218–68. University of Toronto Press, 2012. http://dx.doi.org/10.3138/9781442662377-010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Otto, Heilbrunn. "A Classic in Espionage: The ‘Red Orchestra’, 1941–43." In The Soviet Secret Services, 21–32. Routledge, 2020. http://dx.doi.org/10.4324/9781003103158-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Piekarz, Agnieszka. "Characteristics and Activities of the US Secret Service." In Corporate Espionage, Geopolitics, and Diplomacy Issues in International Business, 293–303. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1031-4.ch017.

Full text
Abstract:
The United States Secret Service is one of the world's oldest and most elite security agencies protecting the most important people in the country such as the President and Vice President, among others. However, this is not the agency's only responsibility. This chapter covers the organization's other duties such as locating counterfeit money, discovering fake documents such as passports, fraud, and intelligence / counterintelligence. Furthermore, the chapter explains how the Secret Service was established, how its responsibilities have changed over the years, and major historical events which highly influenced the entire agency. Finally, the chapter examines the agency's international cooperation with the Polish security agency, Biuro Ochrony Rzadu (BOR), and domestic cooperation with the US Diplomatic Security Service (DSS).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secret service and espionage"

1

Jalil, Juriah Abd. "Addressing the Threats of Online Theft of Trade Secret and Cyber Espionage in Malaysia: The Legal Landscape." In 2018 6th International Conference on Cyber and IT Service Management (CITSM). IEEE, 2018. http://dx.doi.org/10.1109/citsm.2018.8674061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miteva, Boryana. "Bulgarian scientific and technical intelligence in Japan during the Cold War." In 9th International e-Conference on Studies in Humanities and Social Sciences. Center for Open Access in Science, Belgrade - Serbia, 2023. http://dx.doi.org/10.32591/coas.e-conf.09.06055m.

Full text
Abstract:
Since Bulgarian-Japan relations have already been well researched by the scholar Evgeny Kandilarov, this study aims to pose an accent on a very specific aspect of their Cold War interaction. Based primary on Bulgarian declassified documents of ex-socialist secret services it attempts to supplement Cold War studies and knowledge about Sofia-Tokyo relations as a part of Japan’s relations with the Soviet Union and the East European countries as a whole. It provides analysis regarding aims, methodology, expansion, cooperation, and results of Bulgarian scientific and technical intelligence in Japan during the Cold War years. This study proposes that since Western democracies restricted access of socialist countries to high technology by COCOM and since Japan achieved unimaginable economic and technological growth in the end of 1960s, KGB and all Eastern European secret services estimated Japan as a destination with significant opportunities for scientific and technical intelligence. Bulgarian communist leader Todor Zhivkov was one of the greatest admirers of the Japanese economic model and thus, scientific, and technical intelligence became a priority line for Bulgarian residence in Japan. It was not only a countermeasure in view of COCOM restrictions but transformed into an important element of socialist strategy for modernization. Japan was not the only one of capitalist countries, which became an object of industrial espionage, but it took key place for completing important scientific and technical tasks in the field of electronics, robotics, chemical industry, equipment etc. This knowledge was more or less implemented in industry and contributed to the Bulgarian economic and technological modernization.
APA, Harvard, Vancouver, ISO, and other styles
3

Namin, A. S., Ruizhong Wei, Weiming Shen, and H. Ghenniwa. "Applying secret sharing schemes to service reputation." In Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design. IEEE, 2005. http://dx.doi.org/10.1109/cscwd.2005.194269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zidaru, Marian. "�THE TRUST� STALIN�S OWN SECRET SERVICE ORGANISATIONS." In 9th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2022. SGEM WORLD SCIENCE, 2022. http://dx.doi.org/10.35603/sws.iscss.2022/s01.006.

Full text
Abstract:
�The Trust� Stalin�s own secret service organizations were appropriately named in 1930, for the exclusive purpose of using the emigration upon which he considered the OGPU has not concentrated sufficiently or used to the fullest extent, and this he believed to be because the OGPU, was already overloaded with work in other directions. The work of �The Trust� was the subject of the direct personal control of Stalin who had expressed the opinion that with the advance of Hitler to power in Germany, the political importance of Russian Emigration was growing with the increasing internal difficulties of the Soviet Union. The care with which the agents of �The Trust� were selected was to ensure that only men with a reputation built in long years of experience were chosen. The work of the organizations was divided into several sections, including that: - Using amongst Russian emigrants who were charged with spying work by several officers. - The coming of the Hitler regime in Germany made the Trust institute numerous press organizations of the Russian emigrants in all country's new papers. This paper focuses on the activity of �The Trust� in the 1930s. The paper is based on original documents discovered following research carried out in the British archives.
APA, Harvard, Vancouver, ISO, and other styles
5

Ke, Chenyutao, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, and Kouichi Sakurai. "Cross-group Secret Sharing for Secure Cloud Storage Service." In IMCOM '16: The 10th International Conference on Ubiquitous Information Management and Communication. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2857546.2857610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bissoli, Andrea, and Fabrizio d'Amore. "Authentication as A Service Based on Shamir Secret Sharing." In 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC). IEEE, 2021. http://dx.doi.org/10.1109/iscsic54682.2021.00072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng, Qi, Xiaopu Ma, Qin-Yun Xu, and Yun-Qiu Chen. "A Family of Non-Representable Secret Sharing Matroids." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5304342.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Chih-Hung, Kun-Sheng Sun, Yun-Qiao Wang, Ji-Hwei Horng, and Chin-Chen Chang. "Secret Message CDMA Multiplexing via QR Codes." In ASSE' 22: 2022 3rd Asia Service Sciences and Software Engineering Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3523181.3523189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gyongyosi, Laszlo, and Sandor Imre. "Quantum Informational Geometry for Secret Quantum Communication." In 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns (COMPUTATIONWORLD). IEEE, 2009. http://dx.doi.org/10.1109/computationworld.2009.58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Zhuo. "Multi-Organization Key Agreement and Secret Sharing for CERS." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5303859.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secret service and espionage"

1

Kwan, S., P. Garg, J. Gilroy, L. Esibov, J. Westhead, and R. Hall. Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-TSIG). RFC Editor, October 2003. http://dx.doi.org/10.17487/rfc3645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography