Listing 1 - 10 of 49 | << page >> |
Sort by
|
Choose an application
Sorge's activities between 1930 and 1942 have tended to be lauded as those of a superlative human intelligence operator, and the Soviet Union's GRU (Soviet military intelligence unit) as the optimum of spy-masters. Although it was unusual for a great deal of inside knowledge to be obtained from the Japanese side, most attention has always been paid on the German side to the roles played by representatives of the German Army in Japan. This book, supported by extensive notes and a bibliography, by contrast, highlights the friendly relations between Sorge and Paul Wenneker, German naval attaché in Japan from 1932 to 1937 and 1940-45. Wenneker, from extensive and expanding contacts inside the Japanese Navy (and also concealed contacts with the Japanese Army) supplied Sorge with key information on the depth of rivalry between the Japanese armed services.
Spies --- World War, 1939-1945 --- Secret service --- Espionage. --- Japanese military. --- Riichard Sorge. --- axis. --- intelligence. --- spying. --- ww2. --- Sorge, Richard, --- Subversive activities --- Espionage --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Zorge, Rikhard, --- Зорге, Рихард, --- Zoruge, Rihiaruto, --- Sonter, R.
Choose an application
Espionage --- -Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies --- -Espionage --- Covert operations (Espionage)
Choose an application
Choose an application
Business intelligence --- Corporations --- White collar crimes --- Intelligence économique --- Entreprises --- Crimes en col blanc --- Corrupt practices --- Pratiques déloyales --- Intelligence économique --- Pratiques déloyales --- Economic Competition --- Spying
Choose an application
Choose an application
Cyber intelligence (Computer security) --- Cyberspace --- Computer networks --- Space and time --- Computers --- Telematics --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Security measures
Choose an application
The Literary Spy provides a unique view of the intelligence world through the words of its own major figures (and those fascinated with them) from ancient times to the present. CIA speechwriter and analyst Charles E. Lathrop has compiled and annotated more than 3,000 "ations from such disparate sources as the Bible, spy novels and movies, Shakespeare's plays, declassified CIA documents, memoirs, TV talk shows, and speeches from U.S. and foreign leaders and officials. Arranged in thematic categories with opening commentary for each section, the "ations speak for themselves. Together they serve both to illuminate a world famous for its secrets and deceptions and to show the extent to which intelligence has manifested itself in literature and in life. Engaging, informative, and often irreverent, The Literary Spy is an exceedingly satisfying book-one that meets the needs of the serious researcher just as ably as those of the armchair spy in pursuit of an evening's entertainment.
Espionage --- History, Modern --- Modern history --- World history, Modern --- World history --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies
Choose an application
An in-depth investigation of the Romanian secret police's file on M©ơller, winner of the 2009 Nobel Prize for Literature, re-creating a "file story" of her surveillance. "Herta M©ơller should share her Nobel with the Securitate." This comment by a former officer in the Romanian secret police, or Securitate, was in reaction to hearing that M©ơller, a German writer originally from Romania, had won the 2009 Nobel Prize for Literature. Communist Romania's infamous secret police was indeed a protagonist in M©ơller's work, though an undesired and dreaded one: most of her writings are deeply and explicitly anchored in CeauÌ,¡ ™escu's Romania and her own traumatic experiences with the Securitate. M©ơller's file traces her surveillance from 1983 until after she emigrated to West Germany in 1987. She has written extensively in reaction to reading her file, but primarily addresses its gaps, begging the question what information the file does in fact contain. This book is an in-depth investigation of M©ơller's file, and engages with other related files, including that of her then-husband, the writer Richard Wagner. Valentina Glajar treats the files as primary sources in order to re-create the story of M©ơller's surveillance by the Securitate. In such an intrusive culture of surveillance, surviving the system often meant a certain degree of entanglement: for victims, collaborators, and implicated subjects alike. Veiled in secrecy for decades, these compelling and complex documents shed light on a boundary between victims and perpetrators as porous as the Iron Curtain itself.
Authors, German --- Authors, Romanian --- Espionage --- History --- Müller, Herta, --- Romania. --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies --- DSS (Romania)
Choose an application
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describ
Electronic intelligence. --- Internet in espionage. --- Cyber intelligence (Computer security) --- Internet --- Computer crimes. --- Security measures. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Espionage --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures
Choose an application
Espionage --- Germany (West). --- Germany (East). --- History. --- Germany (West) --- Politics and government --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies --- Germany (Democratic Republic, 1949- ). --- Stasi --- MfS --- Staatssicherheitsdienst der DDR --- Germany (Federal Republic, 1949- ). --- Germany.
Listing 1 - 10 of 49 | << page >> |
Sort by
|