Journal articles on the topic 'United states - espionage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'United states - espionage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Arindiya, Ghina, and Dewi Triwahyuni. "CHINESE ESPIONAGE ACTIVITIES AGAINST THE UNITED STATES MILITARY INDUSTRY." Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 7, no. 1 (2024): 1108–19. http://dx.doi.org/10.34010/icobest.v7i.624.
Full textClarke, Duncan L. "Israel's Economic Espionage in the United States." Journal of Palestine Studies 27, no. 4 (1998): 20–35. http://dx.doi.org/10.2307/2538128.
Full textClarke, Duncan L. "Israel's Economic Espionage in the United States." Journal of Palestine Studies 27, no. 4 (1998): 20–35. http://dx.doi.org/10.1525/jps.1998.27.4.00p00037.
Full textKlehr, Harvey. "REFLECTIONS ON ESPIONAGE." Social Philosophy and Policy 21, no. 1 (2004): 141–66. http://dx.doi.org/10.1017/s0265052504211074.
Full textSmith, Michael M. "The Mexican Secret Service in the United States, 1910-1920." Americas 59, no. 1 (2002): 65–85. http://dx.doi.org/10.1353/tam.2002.0091.
Full textRoissyam, Anja Yanuar, and Bambang Wahyu Nugroho. "Restrictive Policies on Huawei During the Donald Trump Administration: An Analysis of U.S. National Security and Geopolitical Interests." Proceedings University of Muhammadiyah Yogyakarta Undergraduate Conference 3, no. 1 (2023): 62–70. https://doi.org/10.18196/umygrace.v3i1.533.
Full textSmith, Lieutenant Commander Ursula, and Colonel Daniel J. Lecce. "Litigating National Security Cases under The United States Uniform Code of Military Justice." Journal of International Peacekeeping 20, no. 3-4 (2016): 250–74. http://dx.doi.org/10.1163/18754112-02003007.
Full textTerry, Patrick C. R. "“Don't Do as I Do”—The US Response to Russian and Chinese Cyber Espionage and Public International Law." German Law Journal 19, no. 3 (2018): 613–26. http://dx.doi.org/10.1017/s207183220002280x.
Full textHeletei, Andrii. "LEGISLATIVE TOOLS AGAINST AIDING AN AGGRESSOR STATE: ANALYSIS OF THE EXPERIENCE OF THE USA, THE UK, AND THE BALTIC STATES." Baltic Journal of Legal and Social Sciences, no. 2 (June 11, 2025): 40–47. https://doi.org/10.30525/2592-8813-2025-2-5.
Full textAmusan, Lere, and Siphiwe Mchunu. "Adventure into Peacetime Intra-Alliance Espionage: Assessment of the America-Germany Saga." Lithuanian Foreign Policy Review 33, no. 1 (2015): 64–82. http://dx.doi.org/10.1515/lfpr-2016-0010.
Full textTriwahyuni, D., M. Azhar, D. Cahya, and R. Andika. "Cyber Espionage of F-15 Fighter Jet Data Impact To U.S. – China Relations." Proceeding of International Conference on Business, Economics, Social Sciences, and Humanities 6, no. 1 (2023): 762–74. http://dx.doi.org/10.34010/icobest.v4i.446.
Full textWRÓBLEWSKA, Angelika. "SELECTED ADVANCED CYBER ESPIONAGE OPERATIONS." Cybersecurity & Cybercrime 1, no. 1 (2021): 149–64. http://dx.doi.org/10.5604/01.3001.0053.8016.
Full textTerry, Patrick C. R. "“ABSOLUTE FRIENDS”: UNITED STATES ESPIONAGE AGAINST GERMANY AND PUBLIC INTERNATIONAL LAW." Revue québécoise de droit international 28, no. 2 (2015): 173. http://dx.doi.org/10.7202/1067720ar.
Full textWilhelm, Londoño Díaz. "Archaeologists, Bananas, and Spies: The Development of Archaeology in Northern Colombia." Arqueologia Iberoamericana 45 (March 18, 2020): 11–21. https://doi.org/10.5281/zenodo.3733813.
Full textFedoniuk, Serhii, and Serhii Maghdysiuk. "US-China Confrontation in Cyber Security." Історико-політичні проблеми сучасного світу, no. 45 (June 27, 2022): 113–27. http://dx.doi.org/10.31861/mhpi2022.45.113-127.
Full textAvery, Donald. "Secrets Between Different Kinds of Friends: Canada’s Wartime Exchange of Scientific Military Information with the United States and the USSR, 1940‑1945." Historical Papers 21, no. 1 (2006): 225–53. http://dx.doi.org/10.7202/030955ar.
Full textSetzekorn, Eric. "The Contemporary Utility of 1930s Counterintelligence Prosecution Under the United States Espionage Act." International Journal of Intelligence and CounterIntelligence 29, no. 3 (2016): 545–63. http://dx.doi.org/10.1080/08850607.2016.1121050.
Full textAdzanas, Adrian, and Bambang Ipto. "EDWARD SNOWDEN"S COMMUNICATION STRATEGY AGAINST INFORMATION DOMINATION GOVERNMENT OF THE UNITED STATES." dia 20, no. 01 (2022): 121–35. http://dx.doi.org/10.30996/dia.v20i01.6295.
Full textSIBLEY, KATHERINE A. S. "Soviet Military-Industrial Espionage in the United States and the Emergence of an Espionage Paradigm in US-Soviet Relations, 1941-45." American Communist History 2, no. 1 (2003): 21–51. http://dx.doi.org/10.1080/1474389032000112582.
Full textHaynes, John Earl. "The Cold War Debate Continues: A Traditionalist View of Historical Writing on Domestic Communism and Anti-Communism." Journal of Cold War Studies 2, no. 1 (2000): 76–115. http://dx.doi.org/10.1162/15203970051032381.
Full textDonald, L. Buresh. "In Light of The American Departure From Afghanistan, Does Network-Centric Warfare Adequately Prepare The United States to Address Future Cyber Activities by The Taliban?" International Journal of Social Science and Human Research 05, no. 03 (2022): 1050–73. https://doi.org/10.5281/zenodo.6386031.
Full textJonghaeng Yoon. "Recent Trends of Court's Decisions and Legislation on Economic Espionage in the United States." kangwon Law Review 44, no. ll (2015): 477–501. http://dx.doi.org/10.18215/kwlr.2015.44..477.
Full textHouse, Jonathan M. "American Spies: Espionage against the United States from the Cold War to the Present." History: Reviews of New Books 42, no. 4 (2014): 129. http://dx.doi.org/10.1080/03612759.2014.903784.
Full textSegal, Adam. "The code not taken: China, the United States, and the future of cyber espionage." Bulletin of the Atomic Scientists 69, no. 5 (2013): 38–45. http://dx.doi.org/10.1177/0096340213501344.
Full textHaidery, Baqir Hassan. "The US-China Cyber Conflict and Its Impact on the UK's Cybersecurity Policies." Journal of Regional Studies Review 4, no. 1 (2025): 503–15. https://doi.org/10.62843/jrsr/2025.4a096.
Full textArredondo, Ricardo. "DIPLOMACIA, ESPIONAJE Y ORDEN MUNDIAL: EL CIERRE DE CONSULADOS DE CHINA Y ESTADOS UNIDOS." Revista española de derecho internacional 73, no. 1 (2021): 35–56. http://dx.doi.org/10.17103/redi.73.1.2021.1.01.
Full textHaynes, John Earl, and Harvey Klehr. "Alexander Vassiliev's Notebooks and the Documentation of Soviet Intelligence Activities in the United States during the Stalin Era." Journal of Cold War Studies 11, no. 3 (2009): 6–25. http://dx.doi.org/10.1162/jcws.2009.11.3.6.
Full textYang, Yezi, and Chrisy Du. "Dr. Xiaoxing Xi on false science espionage accusations, advocacy, and Oppenheimer." MIT Science Policy Review 5 (August 27, 2024): 170–76. http://dx.doi.org/10.38105/spr.49egkoc8f6.
Full textKlehr, Harvey, and John Earl Haynes. "The First U.S.-Based Soviet Nuclear Spy: The Saga of Clarence Hiskey and Arthur Adams." Journal of Cold War Studies 25, no. 4 (2023): 53–69. http://dx.doi.org/10.1162/jcws_a_01170.
Full textDodson, Julian F. "Deception and Danger: Women and Cross-border Espionage in Mexico, 1923–1929." Latin Americanist 68, no. 4 (2024): 454–77. https://doi.org/10.1353/tla.2024.a947799.
Full textHerken, Gregg. "Target Enormoz: Soviet Nuclear Espionage on the West Coast of the United States, 1942–1950." Journal of Cold War Studies 11, no. 3 (2009): 68–90. http://dx.doi.org/10.1162/jcws.2009.11.3.68.
Full textBubshait, Fawaz. "Cybersecurity in Digital Diplomacy: A Comparative Analysis of the United States and Kingdom of Bahrain." International Journal of Educational Sciences and Arts 4, no. 4 (2025): 60–78. https://doi.org/10.59992/ijesa.2025.v4n4p3.
Full textXiaofeng, Wang. "China’s Alternative Roles in Countering International Economic Cyber Espionage." China Quarterly of International Strategic Studies 02, no. 04 (2016): 549–68. http://dx.doi.org/10.1142/s2377740016500251.
Full textRovner, Joshua, and Tyler Moore. "Does the Internet Need a Hegemon?" Journal of Global Security Studies 2, no. 3 (2017): 184–203. http://dx.doi.org/10.1093/jogss/ogx008.
Full textTuluș, Arthur. "The Condition of National Minorities in Eastern Europe in a Secret Cia Report From 1965." Eminak, no. 2(34) (July 1, 2021): 210–28. http://dx.doi.org/10.33782/eminak2021.2(34).529.
Full textSelyanin, Yaroslav. "The US confrontation with China through the prism of cyberspace." Russia and America in the 21st Century, no. 3 (2023): 0. http://dx.doi.org/10.18254/s207054760026344-5.
Full textPawlikowicz, Leszek. "Wykorzystanie radzieckich emigrantów doby détente w praktyce działań 1. Zarządu Głównego KGB i współczesne reminiscencje tego zjawiska. Casus Stanów Zjednoczonych Ameryki." Polityka i Społeczeństwo 20, no. 4 (2022): 233–48. http://dx.doi.org/10.15584/polispol.2022.4.16.
Full textGul, Noman, Fareed Ullah, and Azmat Ali Shah. "Sino-US Global Competitive Dynamics Post 9/11 and its Impacts on Pakistan's Security." Global Strategic & Securities Studies Review VI, no. II (2021): 162–73. http://dx.doi.org/10.31703/gsssr.2021(vi-ii).16.
Full textOlmsted, Kathryn. "British and US Anticommunism Between the World Wars." Journal of Contemporary History 53, no. 1 (2016): 89–108. http://dx.doi.org/10.1177/0022009416653458.
Full textUsdin, Steven. "The Face of Soviet Espionage in the United States during the Stalin Era: Vladimir Pravdin, “Man of Truth”." Journal of Cold War Studies 26, no. 2 (2024): 78–122. http://dx.doi.org/10.1162/jcws_a_01211.
Full textTrasciatti, Mary Anne. "Kairos, Free Speech, and the Material Conditions of State Power in the United States: The Case of World War I." Journal for the History of Rhetoric 18, no. 2 (2015): 216–26. http://dx.doi.org/10.5325/jhistrhetoric.18.2.0216.
Full textActon, James M. "Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War." International Security 43, no. 1 (2018): 56–99. http://dx.doi.org/10.1162/isec_a_00320.
Full textEkmekçi, Esra. "Cybersecurity and the Future of International Relations." Next Generation Journal for The Young Researchers 8, no. 1 (2024): 57. http://dx.doi.org/10.62802/85tt3452.
Full textLi, Wei. "The Security Service for Chinese Central Leaders." China Quarterly 143 (September 1995): 814–27. http://dx.doi.org/10.1017/s030574100001506x.
Full textGoodman, Michael S. "Who Is Trying to Keep What Secret from Whom and Why? MI5-FBI Relations and the Klaus Fuchs Case." Journal of Cold War Studies 7, no. 3 (2005): 124–46. http://dx.doi.org/10.1162/1520397054377160.
Full textDYACHKOV, Ilya Vladimirovich. "UN SANCTIONS AGAINST THE DPRK: AN ASSESSMENT OF EFFICIENCY." Tambov University Review. Series: Humanities, no. 177 (2018): 173–79. http://dx.doi.org/10.20310/1810-0201-2018-23-177-173-179.
Full textNeagu, Florentina Stefania, and Anca Savu. "The costs of cyberterrorism for the national economy: United States of America vs Egypt." Proceedings of the International Conference on Business Excellence 13, no. 1 (2019): 983–93. http://dx.doi.org/10.2478/picbe-2019-0086.
Full textKuntal, Manorama. "Mossad: The Greatest Missions of the Israeli secret Service." Electronic Journal of Social and Strategic Studies 06, no. 01 (2025): 166–70. https://doi.org/10.47362/ejsss.2025.6110.
Full textBessonova, Maryna. "Canada and the Beginning of the Cold War: Modern Interpretations." American History & Politics Scientific edition, no. 8 (2019): 47–56. http://dx.doi.org/10.17721/2521-1706.2019.08.05.
Full textGilli, Andrea, and Mauro Gilli. "Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage." International Security 43, no. 3 (2019): 141–89. http://dx.doi.org/10.1162/isec_a_00337.
Full text