To see the other types of publications on this topic, follow the link: United states - espionage.

Journal articles on the topic 'United states - espionage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'United states - espionage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Arindiya, Ghina, and Dewi Triwahyuni. "CHINESE ESPIONAGE ACTIVITIES AGAINST THE UNITED STATES MILITARY INDUSTRY." Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 7, no. 1 (2024): 1108–19. http://dx.doi.org/10.34010/icobest.v7i.624.

Full text
Abstract:
This research aims to analyze China's espionage activities against the United States, especially in the military industry. In analyzing the case the author uses the concepts of the Action-Reaction Model and Information War. The espionage conflict between the US and China is influenced by the proximity and complexity of political, technological and strategic factors. The collection technique was carried out through literature study and then analyzed using qualitative methods. The results of this research show that espionage has a major influence on the complexity of cyber security. Final conclu
APA, Harvard, Vancouver, ISO, and other styles
2

Clarke, Duncan L. "Israel's Economic Espionage in the United States." Journal of Palestine Studies 27, no. 4 (1998): 20–35. http://dx.doi.org/10.2307/2538128.

Full text
Abstract:
Israel has conducted an aggressive campaign of economic espionage in the United States since 1948. This campaign has been critical to sustaining and modernizing Israel's nuclear weapons program and an array of its most advanced conventional weapons even while it has caused American firms to lose valuable proprietary information and unfairly advantaged Israeli companies in the international arms market. While other countries conduct economic espionage against the United States, Israel is the only major recipient of U.S. foreign aid to do so.
APA, Harvard, Vancouver, ISO, and other styles
3

Clarke, Duncan L. "Israel's Economic Espionage in the United States." Journal of Palestine Studies 27, no. 4 (1998): 20–35. http://dx.doi.org/10.1525/jps.1998.27.4.00p00037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Klehr, Harvey. "REFLECTIONS ON ESPIONAGE." Social Philosophy and Policy 21, no. 1 (2004): 141–66. http://dx.doi.org/10.1017/s0265052504211074.

Full text
Abstract:
In 1995 the United States National Security Agency (NSA), the Central Intelligence Agency (CIA), and the Federal Bureau of Investigation (FBI) made public the story of a forty-year American intelligence operation code-named Venona. Shortly after the Nazi-Soviet Pact in 1939, American military intelligence had ordered companies that were sending and receiving coded cables overseas, such as Western Union, to turn over copies to the U.S. government. Hundreds of thousands of cables were sent or received by Soviet government bodies. Beginning in 1943, spurred by rumors and concerns that Stalin migh
APA, Harvard, Vancouver, ISO, and other styles
5

Smith, Michael M. "The Mexican Secret Service in the United States, 1910-1920." Americas 59, no. 1 (2002): 65–85. http://dx.doi.org/10.1353/tam.2002.0091.

Full text
Abstract:
Throughout the era of the Mexican Revolution, the United States provided sanctuary for thousands of political exiles who opposed the regimes of Porfirio Díaz, Francisco Madero, Victoriano Huerta, and Venustiano Carranza. Persecuted enemies of Don Porfirio and losers in the bloody war of factions that followed the ouster of the old regime continued their struggle for power from bases of operation north of the international boundary in such places as San Francisco, Los Angeles, El Paso, San Antonio, New Orleans, and New York. As a consequence, Mexican regimes were compelled not only to combat th
APA, Harvard, Vancouver, ISO, and other styles
6

Roissyam, Anja Yanuar, and Bambang Wahyu Nugroho. "Restrictive Policies on Huawei During the Donald Trump Administration: An Analysis of U.S. National Security and Geopolitical Interests." Proceedings University of Muhammadiyah Yogyakarta Undergraduate Conference 3, no. 1 (2023): 62–70. https://doi.org/10.18196/umygrace.v3i1.533.

Full text
Abstract:
The trade war that occurred between United States and China extended to the technology sector. The two countries are competing in the development of 5G networks. China, through Huawei, which is a pioneer in the development of 5G networks, has faced confrontation from the U.S. government by ban Huawei from operate their business in North America. This article will discuss about the restriction policy on Huawei by the United States of America during Donald Trump's presidency. The United States places restrictions on Huawei based on suspicious that 5G network developed by Huawei can be misused by
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Lieutenant Commander Ursula, and Colonel Daniel J. Lecce. "Litigating National Security Cases under The United States Uniform Code of Military Justice." Journal of International Peacekeeping 20, no. 3-4 (2016): 250–74. http://dx.doi.org/10.1163/18754112-02003007.

Full text
Abstract:
This paper will discuss classified litigation procedures in United States Military Courts-Martial, governed by Military Rule of Evidence 505 and the Uniform Code of Military Justice. The differences between United States Federal Court procedures and United States Military Commissions, governed by the Classified Information Privilege Act (cipa) and Military Commissions Rule of Evidence 505, are also discussed. Finally, best practices and selected military cases regarding espionage are presented.
APA, Harvard, Vancouver, ISO, and other styles
8

Terry, Patrick C. R. "“Don't Do as I Do”—The US Response to Russian and Chinese Cyber Espionage and Public International Law." German Law Journal 19, no. 3 (2018): 613–26. http://dx.doi.org/10.1017/s207183220002280x.

Full text
Abstract:
The Russian government is accused of hacking emails circulating among senior members of Hilary Clinton's campaign team to support President Trump's election in 2016. This was not the first time the United States was the target of massive cyber espionage: The Chinese government is believed to have gained sensitive information on 22.1 million US government employees through “cyber intrusions” in 2014. This Article will examine whether cyber espionage of this kind is unlawful under public international law and will conclude that it is. Specifically, such espionage can result in a violation of ter
APA, Harvard, Vancouver, ISO, and other styles
9

Heletei, Andrii. "LEGISLATIVE TOOLS AGAINST AIDING AN AGGRESSOR STATE: ANALYSIS OF THE EXPERIENCE OF THE USA, THE UK, AND THE BALTIC STATES." Baltic Journal of Legal and Social Sciences, no. 2 (June 11, 2025): 40–47. https://doi.org/10.30525/2592-8813-2025-2-5.

Full text
Abstract:
The author analyzes legislative and law enforcement mechanisms for combating assistance to aggressor states in the United States, the United Kingdom, the Baltic States, and at the international level. The study examines historical precedents and legislative acts such as the Espionage Act of 1917, the Foreign Agents Registration Act of 1938, the Official Secrets Act of 1989, as well as international treaties such as the Geneva Conventions and the Rome Statute of the International Criminal Court. Specific cases, including the Rosenbergs, John Walker, Ana Montes, Kim Philby, George Blake, and mod
APA, Harvard, Vancouver, ISO, and other styles
10

Amusan, Lere, and Siphiwe Mchunu. "Adventure into Peacetime Intra-Alliance Espionage: Assessment of the America-Germany Saga." Lithuanian Foreign Policy Review 33, no. 1 (2015): 64–82. http://dx.doi.org/10.1515/lfpr-2016-0010.

Full text
Abstract:
Abstract Peacetime espionage is often employed by states as a means of acquiring information about competitor states in the international system. However the practice is not limited to competitor states. In a world where security concerns are an ever-present consideration for state action, acts of espionage normally reserved for use against enemies are also used against ally states. The basic premise is that while alliances are able to foster mutual trust and cooperation, they do not conclude that an ally will always be trust-worthy and faithful, most especially, when it involves issues of nat
APA, Harvard, Vancouver, ISO, and other styles
11

Triwahyuni, D., M. Azhar, D. Cahya, and R. Andika. "Cyber Espionage of F-15 Fighter Jet Data Impact To U.S. – China Relations." Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 6, no. 1 (2023): 762–74. http://dx.doi.org/10.34010/icobest.v4i.446.

Full text
Abstract:
The purpose of this study is to examine the impact of cyber espionage activities related to the F-35 Joint Strike Fighter Military Project on the relationship between the United States and China. Allegations of Chinese espionage activities first surfaced in the public sphere in early 2015. German media Der Spiegel published a number of pieces of information confirming the result of a data breach by subcontractor Lockheed Martin that allowed China access to classified data on the F35. Cyber espionage is often carried out in order to achieve the national interests of a country in the military, p
APA, Harvard, Vancouver, ISO, and other styles
12

WRÓBLEWSKA, Angelika. "SELECTED ADVANCED CYBER ESPIONAGE OPERATIONS." Cybersecurity & Cybercrime 1, no. 1 (2021): 149–64. http://dx.doi.org/10.5604/01.3001.0053.8016.

Full text
Abstract:
The article presents examples of highly advanced cyber espionage operations aimed atthe structures of states and non-state entities with high impact on the economic activity.The attacks took place between 2003 and 2017. The article presents the steps ofOperation Titan Rain and Operation Gh0stNet and also one of the longest espionageoperations revealed to the public, which is Operation The Night Dragon. Anotheroperation is a series of cyber attacks identified by McAfee - Operation Shady RAT. Theyears 2009-2010 belong to Operation Aurora, whose victims were dozens oforganizations, including Goog
APA, Harvard, Vancouver, ISO, and other styles
13

Terry, Patrick C. R. "“ABSOLUTE FRIENDS”: UNITED STATES ESPIONAGE AGAINST GERMANY AND PUBLIC INTERNATIONAL LAW." Revue québécoise de droit international 28, no. 2 (2015): 173. http://dx.doi.org/10.7202/1067720ar.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wilhelm, Londoño Díaz. "Archaeologists, Bananas, and Spies: The Development of Archaeology in Northern Colombia." Arqueologia Iberoamericana 45 (March 18, 2020): 11–21. https://doi.org/10.5281/zenodo.3733813.

Full text
Abstract:
Archaeology in northern Colombia, from the perspective of social history, was developed by American archaeologists after the First World War, when the United States began an expansion in Central America and the Caribbean through banana plantation operations. The United Fruit Company (UFC), a Boston-based company, owned large tracts of land in Central America and some areas of South America, including the Magdalena region in Colombia. Many archaeologists, associated with various museum institutions, used the banana company's networks to conduct archaeological expeditions alongside their esp
APA, Harvard, Vancouver, ISO, and other styles
15

Fedoniuk, Serhii, and Serhii Maghdysiuk. "US-China Confrontation in Cyber Security." Історико-політичні проблеми сучасного світу, no. 45 (June 27, 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.

Full text
Abstract:
This study presents the research results of the activities of the United States and China as the major global competitors in the field of cybersecurity. We have established the nature and trends of the confrontation, explored the goals and means of cyber influences in the confrontation between two states in this area, and identified directions for the development of the competition between the United States and China in the field of cybersecurity. Today, the United States and China are the world leaders in cyberspace and the information (cyber) security sector. The United States remains the un
APA, Harvard, Vancouver, ISO, and other styles
16

Avery, Donald. "Secrets Between Different Kinds of Friends: Canada’s Wartime Exchange of Scientific Military Information with the United States and the USSR, 1940‑1945." Historical Papers 21, no. 1 (2006): 225–53. http://dx.doi.org/10.7202/030955ar.

Full text
Abstract:
Abstract The outbreak of the Second World War, with the emphasis on new weapons and defence technology, brought about dramatic changes in the role of the scientist in Britain, the United States, and Canada. In many ways, Canadian scientists were most affected by these changes. Now, through the National Research Council and various defence agencies, they were able to gain access to highly confidential scientific data through the medium of joint British and Canadian research projects. Equally important was the extent that the British connection made it possible for Canadian scientists to become
APA, Harvard, Vancouver, ISO, and other styles
17

Setzekorn, Eric. "The Contemporary Utility of 1930s Counterintelligence Prosecution Under the United States Espionage Act." International Journal of Intelligence and CounterIntelligence 29, no. 3 (2016): 545–63. http://dx.doi.org/10.1080/08850607.2016.1121050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Adzanas, Adrian, and Bambang Ipto. "EDWARD SNOWDEN"S COMMUNICATION STRATEGY AGAINST INFORMATION DOMINATION GOVERNMENT OF THE UNITED STATES." dia 20, no. 01 (2022): 121–35. http://dx.doi.org/10.30996/dia.v20i01.6295.

Full text
Abstract:
This research explains how Edward Snowden disseminates data from the National Security Agency (NSA) secret program. As a result of Edward Snowden’s espionage action, Snowden received sanction from the United States Department of Justice to file criminal charges against Snowden. In its implementation, the results of the leakage have an important on distrust between the allies and the United States government. Allied countries and the international public are asking the United States government to reform the NSA to be more transparent. This research focuses on qualitative research methods. Data
APA, Harvard, Vancouver, ISO, and other styles
19

SIBLEY, KATHERINE A. S. "Soviet Military-Industrial Espionage in the United States and the Emergence of an Espionage Paradigm in US-Soviet Relations, 1941-45." American Communist History 2, no. 1 (2003): 21–51. http://dx.doi.org/10.1080/1474389032000112582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Haynes, John Earl. "The Cold War Debate Continues: A Traditionalist View of Historical Writing on Domestic Communism and Anti-Communism." Journal of Cold War Studies 2, no. 1 (2000): 76–115. http://dx.doi.org/10.1162/15203970051032381.

Full text
Abstract:
This article reviews the huge Cold War-era and post-Cold War literature on American Communism and anti-Communism in the United States. These issues have long been the subject of heated scholarly debate. The recent opening of archives in Russia and other former Communist countries and the release of translated Venona documents in the United States have shed new light on key aspects of the American Communist Party that were previously unknown or undocumented. The new evidence has underscored the Soviet Union's tight control of the party and the crucial role that American Communists played in Sov
APA, Harvard, Vancouver, ISO, and other styles
21

Donald, L. Buresh. "In Light of The American Departure From Afghanistan, Does Network-Centric Warfare Adequately Prepare The United States to Address Future Cyber Activities by The Taliban?" International Journal of Social Science and Human Research 05, no. 03 (2022): 1050–73. https://doi.org/10.5281/zenodo.6386031.

Full text
Abstract:
The issue considered in this article is whether the United States is prepared adequately to address the cyber activities of the Taliban in the future in light of the recent American departure from Afghanistan. The first section defines and discusses cyber espionage, cyber sabotage, cyber terrorism, and cyber warfare. The following section outlines the notion of network-centric warfare and its relationship to the various cyber-attacks. The third section contains a brief history of the Taliban, cumulating in assessing the current political situation in Afghanistan. The paper’s final sectio
APA, Harvard, Vancouver, ISO, and other styles
22

Jonghaeng Yoon. "Recent Trends of Court's Decisions and Legislation on Economic Espionage in the United States." kangwon Law Review 44, no. ll (2015): 477–501. http://dx.doi.org/10.18215/kwlr.2015.44..477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

House, Jonathan M. "American Spies: Espionage against the United States from the Cold War to the Present." History: Reviews of New Books 42, no. 4 (2014): 129. http://dx.doi.org/10.1080/03612759.2014.903784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Segal, Adam. "The code not taken: China, the United States, and the future of cyber espionage." Bulletin of the Atomic Scientists 69, no. 5 (2013): 38–45. http://dx.doi.org/10.1177/0096340213501344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Haidery, Baqir Hassan. "The US-China Cyber Conflict and Its Impact on the UK's Cybersecurity Policies." Journal of Regional Studies Review 4, no. 1 (2025): 503–15. https://doi.org/10.62843/jrsr/2025.4a096.

Full text
Abstract:
This paper explores the geopolitical implications of the U.S.-China cyber conflict and its cascading effects on the United Kingdom’s cybersecurity posture. As the United States and China engage in strategic cyber competition involving espionage, data theft, and digital infrastructure control, third-party states like the UK are compelled to recalibrate their cybersecurity strategies. Employing Realist theory in international relations, the paper explains how power maximization and national sovereignty guide cybersecurity policy decisions in a multipolar digital world. By analyzing the evolution
APA, Harvard, Vancouver, ISO, and other styles
26

Arredondo, Ricardo. "DIPLOMACIA, ESPIONAJE Y ORDEN MUNDIAL: EL CIERRE DE CONSULADOS DE CHINA Y ESTADOS UNIDOS." Revista española de derecho internacional 73, no. 1 (2021): 35–56. http://dx.doi.org/10.17103/redi.73.1.2021.1.01.

Full text
Abstract:
This paper analyzes the political and legal context of the closure of the Chinese consulates in Houston and the American one in Chengdu in the framework of international law in general and, specifically, of the Vienna Convention on Consular Relations (1963) and the Chinese Consular Convention - United States (1980). In the first part, a brief description is made of the status of bilateral relations between China and the United States, and then it particularly considers aspects related to: a) the decision of both countries to close the aforementioned consular offices; b) the alleged conduct per
APA, Harvard, Vancouver, ISO, and other styles
27

Haynes, John Earl, and Harvey Klehr. "Alexander Vassiliev's Notebooks and the Documentation of Soviet Intelligence Activities in the United States during the Stalin Era." Journal of Cold War Studies 11, no. 3 (2009): 6–25. http://dx.doi.org/10.1162/jcws.2009.11.3.6.

Full text
Abstract:
Alexander Vassiliev's notebooks with 1,115 pages of handwritten transcriptions, excerpts, and summaries from Soviet Committee on State Security (KGB) archival files provide the most detailed documentation available of Soviet espionage in the United States in the 1930s and 1940s. This article discusses the provenance of the notebooks and how they fit with previously available Federal Bureau of Investigation (FBI) files, KGB cables decrypted by the Venona project, Communist International records, court proceedings, and congressional investigations. As an example of the richness of the material,
APA, Harvard, Vancouver, ISO, and other styles
28

Yang, Yezi, and Chrisy Du. "Dr. Xiaoxing Xi on false science espionage accusations, advocacy, and Oppenheimer." MIT Science Policy Review 5 (August 27, 2024): 170–76. http://dx.doi.org/10.38105/spr.49egkoc8f6.

Full text
Abstract:
Dr. Xiaoxing Xi is a Chinese American physicist and the Laura H. Carnell Professor of Physics at Temple University. Born in China, Dr. Xi moved to the United States in 1989 and has since become a naturalized U.S. citizen. In May of 2015, Dr. Xi was arrested at gunpoint by the Federal Bureau of Investigation (FBI) for alleged espionage. He was placed on administrative leave and barred from accessing his lab. Four months later, the U.S. Department of Justice (DOJ) dropped all charges against him. Since then, Dr. Xi has launched a campaign against racial profiling in science, testifying before Co
APA, Harvard, Vancouver, ISO, and other styles
29

Klehr, Harvey, and John Earl Haynes. "The First U.S.-Based Soviet Nuclear Spy: The Saga of Clarence Hiskey and Arthur Adams." Journal of Cold War Studies 25, no. 4 (2023): 53–69. http://dx.doi.org/10.1162/jcws_a_01170.

Full text
Abstract:
Abstract Years before anything was publicly disclosed about the nuclear espionage of Julius and Ethel Rosenberg, Klaus Fuchs, and Theodore Hall, the U.S. Federal Bureau of Investigation (FBI) and U.S. Army Intelligence identified Clarence Hiskey, a Manhattan Project scientist, as a Soviet spy helping to provide highly sensitive nuclear weapons information. The two agencies kept watch on a Soviet intelligence officer, Arthur Adams, who was living illegally in the United States and serving as Hiskey's control officer. Despite an extensive investigation, neither Hiskey nor Adams was ever arrested
APA, Harvard, Vancouver, ISO, and other styles
30

Dodson, Julian F. "Deception and Danger: Women and Cross-border Espionage in Mexico, 1923–1929." Latin Americanist 68, no. 4 (2024): 454–77. https://doi.org/10.1353/tla.2024.a947799.

Full text
Abstract:
Abstract: “Deception and Danger: Women and Cross-border Espionage in Mexico, 1923–1929” focuses on women’s roles in cross-border espionage in exile in the United States and the Confidential Department agents who labored in the offices of state, and along the US-Mexico border, tasked with countering their work. Women who became the political standard-bearers of Catholic social action and those who were respected as intelligence brokers among political Catholic exiles operated within, but also despite, extant patriarchal structures. While recent scholarship has clearly demonstrated that women’s
APA, Harvard, Vancouver, ISO, and other styles
31

Herken, Gregg. "Target Enormoz: Soviet Nuclear Espionage on the West Coast of the United States, 1942–1950." Journal of Cold War Studies 11, no. 3 (2009): 68–90. http://dx.doi.org/10.1162/jcws.2009.11.3.68.

Full text
Abstract:
Alexander Vassiliev's notebooks fill in long-standing gaps in historians' understanding of Soviet nuclear espionage in the western United States during the Second World War and Cold War. Scholars are, in effect, finally able to see some of the most notorious spy cases in modern history from the Soviet side. The notebooks exonerate some individuals who were accused of spying—and whose careers were ruined as a result—while confirming the guilt of others. These revelations include an arguably definitive answer to a question that has been the centerpiece of Cold War controversy for more than half
APA, Harvard, Vancouver, ISO, and other styles
32

Bubshait, Fawaz. "Cybersecurity in Digital Diplomacy: A Comparative Analysis of the United States and Kingdom of Bahrain." International Journal of Educational Sciences and Arts 4, no. 4 (2025): 60–78. https://doi.org/10.59992/ijesa.2025.v4n4p3.

Full text
Abstract:
In an era of digital diplomacy, cybersecurity has become a critical component of international relations. As diplomatic engagements shift to digital platforms, the risks associated with cyber threats-ranging from espionage and misinformation to cyber warfare-have escalated. This study provides a comparative analysis of cybersecurity strategies in digital diplomacy between the United States and Kingdom of Bahrain, two nations with distinct geopolitical positions and technological capabilities. The research employs an empirical approach, integrating international case studies to assess how both
APA, Harvard, Vancouver, ISO, and other styles
33

Xiaofeng, Wang. "China’s Alternative Roles in Countering International Economic Cyber Espionage." China Quarterly of International Strategic Studies 02, no. 04 (2016): 549–68. http://dx.doi.org/10.1142/s2377740016500251.

Full text
Abstract:
This article examines China’s respective roles as a suspect, victim, and stakeholder in countering international economic cyber espionage (ECE) activities. Refuting the widespread evidence and cases that have misguided those with interests or concerns in cyber security issues, the author underscores the cognitive defects and logical fallacies in the prevailing suspicion and accusations against China. Not only is China among the victims of ECE activities, it will face even more ECE threats in the future. With growing cyber capacity, however, China has been determined to develop into a strong cy
APA, Harvard, Vancouver, ISO, and other styles
34

Rovner, Joshua, and Tyler Moore. "Does the Internet Need a Hegemon?" Journal of Global Security Studies 2, no. 3 (2017): 184–203. http://dx.doi.org/10.1093/jogss/ogx008.

Full text
Abstract:
Abstract Hegemonic stability theory holds that a dominant power can produce international cooperation by providing public goods and resolving collective action dilemmas. Successful hegemons also resist the temptation to exploit their advantages in order to reduce other states’ fear of domination. This article asks whether or not the internet needs the United States to play a similar role. If so, Washington should pursue policies designed to strengthen internet security while eschewing espionage and cyberattacks that rely on some degree of internet insecurity. If not, it can go on the offensive
APA, Harvard, Vancouver, ISO, and other styles
35

Tuluș, Arthur. "The Condition of National Minorities in Eastern Europe in a Secret Cia Report From 1965." Eminak, no. 2(34) (July 1, 2021): 210–28. http://dx.doi.org/10.33782/eminak2021.2(34).529.

Full text
Abstract:
In the context of the Cold War, detailed knowledge of the opponent and espionage were fundamental elements in the security policies of the two antagonistic sides. The CIA, the United States’ foreign intelligence service, identified the condition of ethnic minorities as one of the possible vulnerabilities of the Eastern Camp, judging from the perspective of the restrictive policies that Communist states held regarding rights and freedoms. Our study is based on the analysis of a document prepared by the CIA in 1965, a memorandum that took data from the latest official censuses in Bulgaria, Roman
APA, Harvard, Vancouver, ISO, and other styles
36

Selyanin, Yaroslav. "The US confrontation with China through the prism of cyberspace." Russia and America in the 21st Century, no. 3 (2023): 0. http://dx.doi.org/10.18254/s207054760026344-5.

Full text
Abstract:
U.S National Security Strategy 2022 calls People Republic of China as the main enemy for decades. In the United States' point of view cyberspace is the one of key spaces for confronting against China, where America is preparing to deter its “aggression”. Washington blames Beijing in using cyber for espionage and influence operation and also in having technical ability to attacking American infrastructure, including critical. How have U.S. strategic documents assessment of Chinese activities evolved from the NSS 2006? Which threats from PRC does the U.S. see for themselves in cyber? Wh
APA, Harvard, Vancouver, ISO, and other styles
37

Pawlikowicz, Leszek. "Wykorzystanie radzieckich emigrantów doby détente w praktyce działań 1. Zarządu Głównego KGB i współczesne reminiscencje tego zjawiska. Casus Stanów Zjednoczonych Ameryki." Polityka i Społeczeństwo 20, no. 4 (2022): 233–48. http://dx.doi.org/10.15584/polispol.2022.4.16.

Full text
Abstract:
The article – on the basis of American official and court documents (relating to four documented cases of espionage between 1975 and 1991) and using empirical, quantitative and comparative methods – for the first time comprehensively analyses the activities carried out for the benefit of the KGB foreign intelligence service by emigrants from the USSR who arrived in the United States between 1971 and 1984. In addition to describing the scale and peculiarities of the aforementioned migration wave, the four main directions of their operational work are presented, as well as the development of new
APA, Harvard, Vancouver, ISO, and other styles
38

Gul, Noman, Fareed Ullah, and Azmat Ali Shah. "Sino-US Global Competitive Dynamics Post 9/11 and its Impacts on Pakistan's Security." Global Strategic & Securities Studies Review VI, no. II (2021): 162–73. http://dx.doi.org/10.31703/gsssr.2021(vi-ii).16.

Full text
Abstract:
In this paper we examine the security implications for Pakistan after the engagement of two powerful states, China and United States. After the incident of September 11, 2001 (9/11) and their security impacts in the capacity of Pakistan's domestic and peripheral front. Their rivalry in the 21st century at the geo strategic, geopolitical and geo-economic level have been explained on the basis of realism, neo-realism and complex interdependence philosophies of international relations. The drastic political and strategic change in the status of Kashmir propelled Pakistan and China to review their
APA, Harvard, Vancouver, ISO, and other styles
39

Olmsted, Kathryn. "British and US Anticommunism Between the World Wars." Journal of Contemporary History 53, no. 1 (2016): 89–108. http://dx.doi.org/10.1177/0022009416653458.

Full text
Abstract:
This article examines the espionage and propaganda networks established by former professional spies and other anticommunist activists in the interwar period in the United States of America and the United Kingdom. In both countries, conservatives responded to the growing power of labor in politics by creating and funding private groups to coordinate spying operations on union activists and political radicals. These British and US spies drew upon the resources of the government while evading democratic controls. The anti-labor groups also spread anti-radical propaganda, but the counter-subversi
APA, Harvard, Vancouver, ISO, and other styles
40

Usdin, Steven. "The Face of Soviet Espionage in the United States during the Stalin Era: Vladimir Pravdin, “Man of Truth”." Journal of Cold War Studies 26, no. 2 (2024): 78–122. http://dx.doi.org/10.1162/jcws_a_01211.

Full text
Abstract:
Abstract Vladimir Pravdin was a senior Soviet intelligence officer in New York and Washington, DC, during World War II. He oversaw some of the most important Soviet agents of the era, including Harry Dexter White, a senior official at the U.S. Treasury Department; Lauchlin Currie, the chief economic adviser to U.S. President Franklin Roosevelt; and Judith Coplon, a U.S. Justice Department employee who provided intelligence on the U.S. Federal Bureau of Investigation. Pravdin's cover in the United States was as an editor and then director of U.S. operations for the TASS news agency. In his capa
APA, Harvard, Vancouver, ISO, and other styles
41

Trasciatti, Mary Anne. "Kairos, Free Speech, and the Material Conditions of State Power in the United States: The Case of World War I." Journal for the History of Rhetoric 18, no. 2 (2015): 216–26. http://dx.doi.org/10.5325/jhistrhetoric.18.2.0216.

Full text
Abstract:
ABSTRACT This article considers versions of kairos within the context of World War I and the 1917 Espionage Act, a U.S. law that significantly narrowed parameters for free speech to protect the national interest. Many political activists and pacifists who perceived the war as an opportune moment for a critique of state power and corporate interests suffered material consequences for making such a critique—or remained silent for fear of consequences. While affirming the materiality of kairos and the centrality of body performance, I suggest an expanded version embodying the principle that freed
APA, Harvard, Vancouver, ISO, and other styles
42

Acton, James M. "Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War." International Security 43, no. 1 (2018): 56–99. http://dx.doi.org/10.1162/isec_a_00320.

Full text
Abstract:
Nonnuclear weapons are increasingly able to threaten dual-use command, control, communication, and intelligence assets that are spaced based or distant from probable theaters of conflict. This form of “entanglement” between nuclear and nonnuclear capabilities creates the potential for Chinese or Russian nonnuclear strikes against the United States or U.S. strikes against either China or Russia to spark inadvertent nuclear escalation. Escalation pressures could be generated through crisis instability or through one of two newly identified mechanisms: “misinterpreted warning” or the “damage-limi
APA, Harvard, Vancouver, ISO, and other styles
43

Ekmekçi, Esra. "Cybersecurity and the Future of International Relations." Next Generation Journal for The Young Researchers 8, no. 1 (2024): 57. http://dx.doi.org/10.62802/85tt3452.

Full text
Abstract:
This research examines the growing influence of cybersecurity on international relations, focusing on how cyber threats, digital espionage, and cyber warfare are transforming state sovereignty, diplomacy, and global security. With the rise of state-sponsored cyberattacks and the increasing involvement of non-state actors, cybersecurity has become a central issue in the global power dynamics between major nation-states and international organizations. The study analyzes high-profile cyber incidents, such as the SolarWinds and Stuxnet attacks, and investigates their geopolitical implications, in
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Wei. "The Security Service for Chinese Central Leaders." China Quarterly 143 (September 1995): 814–27. http://dx.doi.org/10.1017/s030574100001506x.

Full text
Abstract:
National leaders need security protection against political assassinations, espionage, terrorism and many other dangers, and therefore almost every country has a specialized organization to provide such protection. In the United States, the President is protected by the Secret Service of the Treasury Department, and in the Soviet Union, the Kremlin denizens were guarded by the Ninth Directorate of the KGB. The Chinese security system for the top leadership, consisting mainly of the Central Security Bureau in Zhongnanhai, is however distinctive in several respects. Institutionally it has a pecu
APA, Harvard, Vancouver, ISO, and other styles
45

Goodman, Michael S. "Who Is Trying to Keep What Secret from Whom and Why? MI5-FBI Relations and the Klaus Fuchs Case." Journal of Cold War Studies 7, no. 3 (2005): 124–46. http://dx.doi.org/10.1162/1520397054377160.

Full text
Abstract:
Klaus Fuchs was one of the most infamous spies of the Cold War, whose espionage feats altered the nature of the early postwar period. Drawing on newly released archival documents and witness testimony, this article considers the events surrounding his arrest and conviction. These sources reveal that even before Fuchs was arrested, he was used as a pawn.Because of his supreme importance to the British nuclear weapons program, some British of ficials initially believed that he should remain in his position, despite his admission of guilt. Until the matter was resolved, Fuchs was used unwittingly
APA, Harvard, Vancouver, ISO, and other styles
46

DYACHKOV, Ilya Vladimirovich. "UN SANCTIONS AGAINST THE DPRK: AN ASSESSMENT OF EFFICIENCY." Tambov University Review. Series: Humanities, no. 177 (2018): 173–79. http://dx.doi.org/10.20310/1810-0201-2018-23-177-173-179.

Full text
Abstract:
The last decade and a half we saw the gradual forming of a sanctions regime against the DPRK in connection with Pyongyang’s nuclear and missile programs. United Nations Security Council resolutions have disconnected North Korea from the global financial system, cut all foreign military ties with the country, introduced considerable sectoral sanctions on imports and exports, blocked major channels Pyongyang used to acquire foreign currency. Besides, the United States, South Korea and Japan have simultaneously enforced unilateral restrictions. Early 2018 offers an opportunity to solve the Korean
APA, Harvard, Vancouver, ISO, and other styles
47

Neagu, Florentina Stefania, and Anca Savu. "The costs of cyberterrorism for the national economy: United States of America vs Egypt." Proceedings of the International Conference on Business Excellence 13, no. 1 (2019): 983–93. http://dx.doi.org/10.2478/picbe-2019-0086.

Full text
Abstract:
Abstract In recent years cyber terrorism has become increasingly used with the globalization of technology and people’s access to high-speed internet. It takes place exclusively in the online environment, the advantage being that it offers an increased level of anonymity to users. Terrorist groups are targeting the misappropriation of social media accounts, focused on Distributed Denial of Service activities, exploiting communications services and banking services for fraudulent misappropriation of financial accounts. Cyberterrorism generates very high costs for the national economy, such as t
APA, Harvard, Vancouver, ISO, and other styles
48

Kuntal, Manorama. "Mossad: The Greatest Missions of the Israeli secret Service." Electronic Journal of Social and Strategic Studies 06, no. 01 (2025): 166–70. https://doi.org/10.47362/ejsss.2025.6110.

Full text
Abstract:
Mossad: The Greatest Missions of the Israeli Secret Service authored by Michael Bar-Zohar Nissim Mishal is a captivating book originally published in the year 2014 but holds its relevance even in 2025. The book focuses on the themes of covert warfare, terrorism, cyber intelligence, and geopolitical espionage which continue to shape global security even today. The book presents a compelling account of Israel’s intelligence agency, detailing some of its most daring operations in a global security and intelligence context, showing how espionage, counterterrorism, and clandestine operations shape
APA, Harvard, Vancouver, ISO, and other styles
49

Bessonova, Maryna. "Canada and the Beginning of the Cold War: Modern Interpretations." American History & Politics Scientific edition, no. 8 (2019): 47–56. http://dx.doi.org/10.17721/2521-1706.2019.08.05.

Full text
Abstract:
The most widespread plots interpreted as the beginning of the Cold War are the events that took place in 1946: February 9 – J. Stalin’s speech to the electorate in Moscow; February 22 – the American charge d’Affaires in the Soviet Union G. Kennan’s “long telegram”; March 5 – W. Churchill’s speech in Fulton (the USA); September 27 – the Soviet Ambassador in the United States N. Novikov’s “long telegram”. But there was an earlier event, so called “Gouzenko affair”, which is almost unknown for the Ukrainian historiography. On September 5, 1945, Igor Gouzenko, a cipher clerk of the Soviet embassy
APA, Harvard, Vancouver, ISO, and other styles
50

Gilli, Andrea, and Mauro Gilli. "Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage." International Security 43, no. 3 (2019): 141–89. http://dx.doi.org/10.1162/isec_a_00337.

Full text
Abstract:
Can countries easily imitate the United States' advanced weapon systems and thus erode its military-technological superiority? Scholarship in international relations theory generally assumes that rising states benefit from the “advantage of backwardness.” That is, by free riding on the research and technology of the most advanced countries, less developed states can allegedly close the military-technological gap with their rivals relatively easily and quickly. More recent works maintain that globalization, the emergence of dual-use components, and advances in communications have facilitated th
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!