Knowledge

Espionage

Source đź“ť

4411:, vol. 103, no. 1 (January/February 2024), pp. 150–156. "The dollar is one of the few currencies that almost all major banks will accept, and... the most widely used... As a result, the dollar is the currency that many companies must use... to do international business." (p. 150.) "ocal banks facilitating that trade... normally... buy U.S. dollars and then use dollars to buy . To do so, however, the banks must have access to the U.S. financial system and... follow rules laid out by Washington." (pp. 151–152.) "But there is another, lesser-known reason why the commands overwhelming economic power. Most of the world's 4337:, 2 September 2019, pp. 53–59. "There seems to be a paranoid paradox of espionage: the better your intelligence, the dumber your conduct; the more you know, the less you anticipate.... Hard-won information is ignored or wildly misinterpreted.... happens again and again a seeming national advance in intelligence is squandered through cross-bred confusion, political rivalry, mutual bureaucratic suspicions, intergovernmental competition, and fear of the press (as well as leaks to the press), all seasoned with dashes of sexual jealousy and adulterous intrigue." (p. 54.) 2632: 1490:(CIA) to coordinate intelligence and the National Security Agency for research into codes and electronic communication. In addition to these, the United States has 13 other intelligence gathering agencies; most of the U.S. expenditures for intelligence gathering are budgeted to various Defense Dept. agencies and their programs. Under the intelligence reorganization of 2004, the director of national intelligence is responsible for overseeing and coordinating the activities and budgets of the U.S. intelligence agencies. 1995: 1797: 6436: 2335: 45: 4464:
154–155.) Farrell and Newman, writes Krugman, "are worried about the possibility of overreach. f the weaponizes the dollar against too many countries, they might... band together and adopt alternative methods of international payment. If countries become deeply worried about U.S. spying, they could lay fiber-optic cables that bypass the . And if Washington puts too many restrictions on American exports, foreign firms might turn away from U.S. technology." (p. 155.)
6445: 1368: 109: 2751:. This provides a mandatory death sentence if a person captured in the act is proven to be "lurking as a spy or acting as a spy in or about any place, vessel, or aircraft, within the control or jurisdiction of any of the armed forces, or in or about any shipyard, any manufacturing or industrial plant, or any other place or institution engaged in work in aid of the prosecution of the war by the United States, or elsewhere". 2582:. The BBC reported in 2012 on one such case, that of Mohammed Idrees, who was held under Indian police control for approximately 13 years for overstaying his 15-day visa by 2–3 days after seeing his ill parents in 1999. Much of the 13 years were spent in prison waiting for a hearing, and more time was spent homeless or living with generous families. The Indian 2213:: engages in clandestine activity for two intelligence or security services (or more in joint operations), who provides information about one or about each to the other, and who wittingly withholds significant information from one on the instructions of the other or is unwittingly manipulated by one so that significant facts are withheld from the adversary. 2615:
legally as "information of all sorts gathered by a government or organisation to guide its decisions. It includes information that may be both public and private, obtained from much different public or secret sources. It could consist entirely of information from either publicly available or secret sources, or be a combination of the two."
4614: 4443:
equipment to much of the planet giv China the power to eavesdrop on the rest of the world – just as the has done.... The learned that Huawei had been dealing surreptitiously with Iran – and therefore violating U.S. sanctions. Then, it... used its special access to information on international bank
2622:
There are also laws surrounding government and organisational intelligence and surveillance. Generally, the body involved should be issued with some form of warrant or permission from the government and should be enacting their procedures in the interest of protecting national security or the safety
2235:
usually has knowledge of both intelligence services and can identify operational techniques of both, thus making third-party recruitment difficult or impossible. The knowledge of operational techniques can also affect the relationship between the operations officer (or case officer) and the agent if
2104:
Many organizations, both national and non-national, conduct espionage operations. It should not be assumed that espionage is always directed at the most secret operations of a target country. National and terrorist organizations and other groups are also targeted. This is because governments want to
2221:, and others who work for themselves rather than a service are not double agents because they are not agents. The fact that double agents have an agent relationship with both sides distinguishes them from penetrations, who normally are placed with the target service in a staff or officer capacity." 2080:
an illegal agent, but is an ordinary citizen who is "relocated", for example, a "protected witness". Nevertheless, such a non-agent very likely will also have a case officer who will act as a controller. As in most, if not all synthetic identity schemes, for whatever purpose (illegal or legal), the
1757:
The US defines espionage towards itself as "the act of obtaining, delivering, transmitting, communicating, or receiving information about the national defence with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign
2702:
military operations while so disguised. Soldiers who are wearing enemy uniforms or civilian clothes simply for the sake of warmth along with other purposes rather than engaging in espionage or similar military operations while so attired are also excluded from being treated as unlawful combatants.
2618:
However, espionage and intelligence can be linked. According to the MI5 website, "foreign intelligence officers acting in the UK under diplomatic cover may enjoy immunity from prosecution. Such persons can only be tried for spying (or, indeed, any criminal offence) if diplomatic immunity is waived
2614:
Government intelligence is very much distinct from espionage, and is not illegal in the UK, providing that the organisations of individuals are registered, often with the ICO, and are acting within the restrictions of the Regulation of Investigatory Powers Act (RIPA). 'Intelligence' is considered
2577:
As of 2012, India and Pakistan were holding several hundred prisoners of each other's country for minor violations like trespass or visa overstay, often with accusations of espionage attached. Some of these include cases where Pakistan and India both deny citizenship to these people, leaving them
2084:
Spies may also be used to spread disinformation in the organization in which they are planted, such as giving false reports about their country's military movements, or about a competing company's ability to bring a product to market. Spies may be given other roles that also require infiltration,
4463:
that her company was not doing business with Iran. Canadian authorities, acting on a U.S. request, arrested her... in December 2018. After... almost three years under house arrest... Meng... was allowed to return to China... But by the prospects for Chinese dominance of 5G had vanished..." (pp.
2675:
addresses the status of wartime spies, specifically within "Laws and Customs of War on Land" (Hague IV); October 18, 1907: CHAPTER II Spies". Article 29 states that a person is considered a spy who, acts clandestinely or on false pretences, infiltrates enemy lines with the intention of acquiring
2230:
Unwitting double agent: offers or is forced to recruit as a double or redoubled agent and in the process is recruited by either a third-party intelligence service or his own government without the knowledge of the intended target intelligence service or the agent. This can be useful in capturing
2701:
distinguishes between a disguised spy and a disguised escaper. It is permissible for these groups to wear enemy uniforms or civilian clothes in order to facilitate their escape back to friendly lines so long as they do not attack enemy forces, collect military intelligence, or engage in similar
2684:
entitled to be treated as prisoners of war upon capture by the enemy. Article 30 states that a spy captured behind enemy lines may only be punished following a trial. However, Article 31 provides that if a spy successfully rejoined his own military and is then captured by the enemy as a lawful
2045:. Often the players have never met. Case officers are stationed in foreign countries to recruit and supervise intelligence agents, who in turn spy on targets in the countries where they are assigned. A spy need not be a citizen of the target country and hence does not automatically commit 2623:
of public citizens. Those carrying out intelligence missions should act within not only RIPA but also the Data Protection Act and Human Rights Act. However, there are spy equipment laws and legal requirements around intelligence methods that vary for each form of intelligence enacted.
1662:
Espionage agents are usually trained experts in a targeted field so they can differentiate mundane information from targets of value to their own organizational development. Correct identification of the target at its execution is the sole purpose of the espionage operation.
3722: 2193:, "Economic Analysts may use their specialized skills to analyze and interpret economic trends and developments, assess and track foreign financial activities, and develop new econometric and modelling methodologies." This may also include information of trade or tariff. 2927:
highlights the adventurous life of U.S. Colonel Sidney Forrester Mashbir, who during the 1920s and 1930s attempted to prevent war with Japan, and when war did erupt, he became General MacArthur's top advisor in the Pacific Theater of World War Two.
2606:, which repealed prior Official Secrets Acts and creates three separate offences for espionage. A person is liable to be imprisoned for life for committing an offence under Section 1 of the Act, or 14 years for an offence under Sections 2 and 3 2814:, a natural consequence of the secrecy inherent in their work. To fill in the blanks, the popular conception of the secret agent has been formed largely by 20th and 21st-century fiction and film. Attractive and sociable real-life agents such as 2112:, and also a great vulnerability when the adversary has sophisticated SIGINT detection and interception capability. Spies rely on COVCOM or covert communication through technically advanced spy devices. Agents must also transfer money securely. 2809:
During the many 20th-century spy scandals, much information became publicly known about national spy agencies and dozens of real-life secret agents. These sensational stories piqued public interest in a profession largely off-limits to
3730: 3320:
Ein neuer Typ des Spions War Daniel Defoe (1650-1731), der Autor des weltberĂĽhmten Romans "Robinson Crusoe" ... Zudem verfaĂźte Defoe eine Theorie der Spionage, in der er der Regierung die Spitzelmethoden des Polizeistaates
2049:
when operating within it. While the more common practice is to recruit a person already trusted with access to sensitive information, sometimes a person with a well-prepared synthetic identity (cover background), called a
1734:
patrols and from diplomats, etc., are not considered espionage. Espionage is the disclosure of sensitive information (classified) to people who are not cleared for that information or access to that sensitive information.
2092:
Many governments spy on their allies as well as their enemies, although they typically maintain a policy of not commenting on this. Governments also employ private companies to collect information on their behalf such as
2689:
against their own country or co-belligerents of that country and may be captured and prosecuted at any place or any time regardless whether he rejoined the military to which he belongs or not or during or after the war.
2647:
In war, espionage is considered permissible as many nations recognize the inevitability of opposing sides seeking intelligence each about the dispositions of the other. To make the mission easier and successful,
1688:
intelligence (offensive, defensive, manoeuvre, naval, air, space). Agents are trained by military espionage education facilities and posted to an area of operation with covert identities to minimize prosecution
1682:
Strategic economic strengths (production, research, manufacture, infrastructure). Agents recruited from science and technology academia, commercial enterprises, and more rarely from among military technologists
2142:
In espionage jargon, an "agent" is the person who does the spying. They may be a citizen of a country recruited by that country to spy on another; a citizen of a country recruited by that country to carry out
2546:(at that time the Act had much stricter guidelines and amongst other things banned speech against military recruiting). The law was later used to suppress publication of periodicals, for example of 3660: 2400:. The risks of espionage vary. A spy violating the host country's laws may be deported, imprisoned, or even executed. A spy violating its own country's laws can be imprisoned for espionage or/and 2708:
are treated as spies as they too wear disguises behind enemy lines for the purpose of waging destruction on an enemy's vital targets in addition to intelligence gathering. For example, during
1706:
Although the news media may speak of "spy satellites" and the like, espionage is not a synonym for all intelligence-gathering disciplines. It is a specific form of human source intelligence (
2656:
to conceal their true identity from the enemy while penetrating enemy lines for intelligence gathering. However, if they are caught behind enemy lines in disguises, they are not entitled to
1137:
Espionage is often part of an institutional effort by a government or commercial concern. However, the term tends to be associated with state spying on potential or actual enemies for
3553: 1679:
towards domestic and foreign policies (popular, middle class, elites). Agents often recruited from field journalistic crews, exchange postgraduate students and sociology researchers
2404:(which in the United States and some other jurisdictions can only occur if they take up arms or aids the enemy against their own country during wartime), or even executed, as the 1742:, espionage usually involves accessing the place where the desired information is stored or accessing the people who know the information and will divulge it through some kind of 1673:: strategic production identification and assessment (food, energy, materials). Agents are usually found among bureaucrats who administer these resources in their own countries 2822:
hero operating outside the everyday constraints of society. Loner spy personalities may have been a stereotype of convenience for authors who already knew how to write loner
2147:
assignments disrupting his own country; a citizen of one country who is recruited by a second country to spy on or work against his own country or a third country, and more.
3640: 3624: 3062: 4123: 3884:"Convention (IV) respecting the Laws and Customs of War on Land and its annex: Regulations concerning the Laws and Customs of War on Land. The Hague, 18 October 1907" 3597: 2685:
combatant, he cannot be punished for his previous acts of espionage and must be treated as a prisoner of war. This provision does not apply to citizens who committed
1403:
had elaborate civilian espionage systems and all national military establishments had intelligence units. In order to protect the country against foreign agents, the
1152:
One way to gather data and information about a targeted organization is by infiltrating its ranks. Spies can then return information such as the size and strength of
5290: 1553:, U.S. cryptographers, in 1960, and Harold (Kim) Philby of Great Britain in 1962. U.S. acknowledgment of its U-2 flights and the exchange of Francis Gary Powers for 5503: 3452:
New Rules for Victims of Armed Conflicts: Commentary on the Two 1977 Protocols Additional to the Geneva Conventions of 1949 (Nijhoff Classics in International Law)
5054: 2840:
is the most commercially successful of the many spy characters created by intelligence insiders during that struggle. Other fictional agents include Le Carré's
2313:
and does not report to a local station. A nonofficial cover operative can be dubbed an "illegal" when working in another country without diplomatic protection.
2236:
the case is transferred by an operational targeting officer] to a new operations officer, leaving the new officer vulnerable to attack. This type of transfer
2434:
and taken to the airport. Ames' wife was threatened with life imprisonment if her husband did not cooperate; he did, and she was given a five-year sentence.
1513:
over the Soviet Union for the CIA, was shot down and captured. During the Cold War, many Soviet intelligence officials defected to the West, including Gen.
5300: 3977: 2438:, a CIA officer in China, spent nineteen years in a Chinese prison for espionage—and died there—as he was operating without diplomatic cover and immunity. 3657: 2720:
thanks to two German agents betraying the mission to the U.S. Under the Hague Convention of 1907, these Germans were classified as spies and tried by a
1172:
have strict laws concerning espionage, including those who practice espionage in other countries, and the penalties for being caught are often severe.
3854: 3362: 2680:
during times of war. Soldiers who penetrate enemy lines in proper uniforms for the purpose of acquiring intelligence are not considered spies but are
1694:
operations targeting opponent's intelligence services themselves, such as breaching the confidentiality of communications and recruiting defectors or
4153: 3501: 4427:
to analyze the data. As a result, the can monitor almost all international communication." (p. 154) This has allowed the U.S. "to effectively cut
3833: 2420:
to his KGB-officer "handler", the KGB "rolled up" several networks, and at least ten people were secretly shot. When Ames was arrested by the U.S.
4572: 3754: 3531: 1298:
freely. In 1481 the Council of Ten barred all Venetian government officials from making contact with ambassadors or foreigners. Those revealing
4415:, which carry data and messages around the planet, travel through the United States." (p. 152.) "he U.S. government has installed 'splitters': 2345: 55: 1998:
An intelligence officer's clothing, accessories, and behavior must be as unremarkable as possible—their lives (and others') may depend on it.
3557: 1486:(Committee for State Security), which also acted as a secret police force. In the United States, the 1947 National Security Act created the 5433: 5097: 4419:
that divide the beams of light carrying information into two streams. One... goes on to the intended recipients, ... the other goes to the
3104:
Fischbacher-Smith, D., 2011. "The enemy has passed through the gate: Insider threats, the dark triad, and the challenges around security".
2542:
Espionage laws are also used to prosecute non-spies. In the United States, the Espionage Act of 1917 was used against socialist politician
3960:"United States of America, Practice Relating to Rule 62. Improper Use of Flags or Military Emblems, Insignia or Uniforms of the Adversary" 5080: 5047: 4952: 3883: 3042: 2780: 2256:
and perform a specific set of tasks or functions while living undercover in an area of interest. This type of agent is not the same as a
1707: 1627: 4094: 3052: 1844: 1739: 1160:
within the organization and influence them to provide further information or to defect. In times of crisis, spies steal technology and
5496: 5137: 3580: 2741: 1626:
Intelligence services value certain intelligence collection techniques over others. The former Soviet Union, for example, preferred
6358: 3963: 3887: 2855:
Jumping on the spy bandwagon, other writers also started writing about spy fiction featuring female spies as protagonists, such as
3414: 2441:
In United States law, treason, espionage, and spying are separate crimes. Treason and espionage have graduated punishment levels.
2306: 3920:
Charlesworth, Lorie (2006). "2 SAS Regiment, War Crimes Investigations, and British Intelligence: Intelligence Officials and the
1726:) are all intelligence gathering disciplines, but none of them is considered espionage. Many HUMINT activities, such as prisoner 1455:
worked against Nazi Germany and provided the Allied secret services with information that was very important for the war effort.
1415:, who obtained information for Germany by seducing French officials, was the most noted espionage agent of World War I. Prior to 5536: 5325: 5295: 5040: 4935: 4891: 3644: 3017: 1070: 3621: 5551: 5478: 4476: 4355: 4184: 4078: 4012: 3394: 2583: 2508: 4120: 3518: 2260:, who continually contacts a case officer to file intelligence reports. A sleeper agent is not in contact with anyone until 7178: 5127: 4886: 3601: 2003: 2818:
find little employment in serious fiction, however. The fictional secret agent is more often a loner, sometimes amoral—an
2134:
companies are estimated to be losing about €50 billion ($ 87 billion) and 30,000 jobs to industrial espionage every year.
4641: 4394: 4300: 2882: 2732:
at the District of Columbia jail. Two who had given evidence against the others had their sentences reduced by President
2693:
The ones that are excluded from being treated as spies while behind enemy lines are escaping prisoners of war and downed
2499:
In modern times, many people convicted of espionage have been given penal sentences rather than execution. For example,
1563:
has a very cost-effective intelligence program that is especially effective in monitoring neighboring countries such as
5071: 2488:
From ancient times, the penalty for espionage in many countries was execution. This was true right up until the era of
2098: 1769: 1715: 1435:. However, the British system was the keystone of Allied intelligence. Numerous resistance groups such as the Austrian 4787: 4497:
Honorable Treachery: A History of U.S. Intelligence, Espionage, Covert Action from the American Revolution to the CIA
4049: 3987: 3306: 3276: 2379: 1337:(died 1731) not only spied for the British government, but also developed a theory of espionage foreshadowing modern 89: 3476: 2105:
retrieve information that they can use to be proactive in protecting their nation from potential terrorist attacks.
7035: 6957: 5428: 5420: 4822: 4747: 4420: 2748: 1781: 706: 470: 2716:, a sabotage mission against U.S. economic targets. Two weeks later, all were arrested in civilian clothes by the 2288:: provides misleading information to an enemy intelligence service or attempts to discredit the operations of the 2174:: instigates trouble or provides information to gather as many people as possible into one location for an arrest. 7183: 5438: 4560: 2962: 2904: 2876: 2421: 6120: 5369: 5194: 5109: 4689: 4435:
programs in exchange for relief." (pp. 153–154.) " few years ago, American officials... were in a panic about
4278: 2977: 2765:
Spies have long been favorite topics for novelists and filmmakers. An early example of espionage literature is
942: 195: 3123: 1764:(1990) defines espionage as: "... gathering, transmitting, or losing ... information related to the 5063: 3702:"USA v. Robert Philip Hanssen: Affidavit in Support of Criminal Complaint, Arrest Warrant and Search Warrant" 3047: 2728:
On August 3, 1942, all eight were found guilty and sentenced to death. Five days later, six were executed by
952: 32: 7030: 6325: 465: 6351: 4543: 4431:
out of the world financial system... Iran's economy stagnated... Eventually, Tehran agreed to cut back its
3862: 3359: 2910: 1785: 1784:. The United States, like most nations, conducts espionage against other nations, under the control of the 1518: 1428: 1027: 936: 7153: 7138: 4161: 5486: 3676: 3455: 3037: 3012: 2967: 2512: 2413: 2066: 1828: 1487: 1266:
and detailed record keeping. Western espionage changed fundamentally during the Renaissance when Italian
3830: 6722: 6461: 6280: 5706: 5529: 4457: 4037: 3758: 3410: 2803: 2619:
beforehand. Those officers operating without diplomatic cover have no such immunity from prosecution".
2603: 2457: 1576: 1522: 1063: 626: 274: 20: 4365:
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
6255: 6105: 4288: 3772: 2503:
is an American CIA analyst, turned KGB mole, who was convicted of espionage in 1994; he is serving a
2310: 2218: 1808:. The reason given is: What about the Defense Department, and the Director of National Intelligence?. 1760: 920: 4393:, "The American Way of Economic war: Is Washington Overusing Its Most Powerful Weapons?" (review of 4323:
America's Secret War: Inside the Hidden Worldwide Struggle Between the United States and Its Enemies
2231:
important information from an agent that is attempting to seek allegiance with another country. The
2041:
In larger networks, the organization can be complex with many methods to avoid detection, including
5844: 5814: 5401: 5132: 2672: 2587: 2453: 2361: 1723: 1631: 1357: 967: 190: 71: 2861:, which has more graphic action and sex, as compared to other novels featuring male protagonists. 2530:. So far as it is known, Ames compromised the second-largest number of CIA agents, second only to 6837: 6344: 5453: 5443: 5391: 5122: 4772: 4742: 4634: 4445: 3032: 2178: 2042: 1871: 1546: 1099: 785: 7143: 6947: 6937: 6560: 6435: 6198: 6130: 5955: 5869: 5809: 5468: 5406: 5386: 5335: 5092: 4547:, vol. LXXI, no. 2 (8 February 2024), pp. 32, 34–35. "n Walton's view, there was scarcely a US 2797: 2094: 1333:
1532–1590) was appointed foreign secretary and intelligence chief. The novelist and journalist
957: 696: 686: 372: 221: 170: 123: 3959: 2590:
both decried his treatment. The BBC attributed some of the problems to tensions caused by the
1575:. Smaller countries can also mount effective and focused espionage efforts. For instance, the 6932: 6697: 6193: 5904: 5522: 5355: 5021: 3057: 3022: 2898: 2857: 2792: 2733: 2465: 2397: 2109: 2019: 1972: 1647: 1408: 1138: 1123: 1119: 1056: 977: 681: 601: 4102: 4041: 7025: 6942: 6927: 6823: 6009: 5731: 5458: 5396: 5282: 5238: 5223: 5172: 5117: 4947: 4930: 4903: 4666: 4551:
that was a long-term strategic success, with the possible exception of intervention in the
3007: 2823: 2811: 2681: 2640: 2631: 2559: 2515: 2435: 2296: 2203:
needed to further an intelligence service agenda. The use of the media to print a story to
2152: 2121: 2007: 1977: 1719: 1639: 1635: 1538: 1181: 1146: 771: 691: 676: 460: 28: 3577: 3415:"Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms" 3197:"Roman and Pontic Intelligence Strategies: Politics and War in the Time of Mithradates VI" 2227:: forced to mislead the foreign intelligence service after being caught as a double agent. 2038:
is a refuge for spies. Spies often seek to obtain secret information from another source.
1505:
and the Rosenberg Case. In 1952 the Communist Chinese captured two CIA agents and in 1960
8: 7115: 6491: 6379: 5914: 5864: 5834: 5804: 5726: 5691: 5491: 5365: 5182: 5009: 4913: 4360: 2920:
depicts a pair of none-too-bright men sent to the Soviet Union to investigate a missile.
2713: 2636: 2571: 2496:
was a Nazi spy who parachuted into Great Britain in 1941 and was executed for espionage.
2473: 2425: 2186: 1952: 1876: 1856: 1691: 1685: 1506: 1467: 1345: 1307: 1165: 915: 303: 255: 185: 175: 3243: 2570:, as well as officials who communicated with journalists for innocuous reasons, such as 2002:
A spy is a person employed to seek out top secret information from a source. Within the
1810:
Please help update this article to reflect recent events or newly available information.
1186:
Espionage has been recognized as of importance in military affairs since ancient times.
7173: 7040: 7020: 6985: 6975: 6595: 6576: 6506: 6415: 6285: 6037: 5854: 5786: 5756: 5601: 5591: 5463: 5448: 5340: 5315: 5253: 5204: 5189: 4898: 4865: 4839: 4817: 4812: 4782: 4767: 4627: 4412: 4249: 3941: 3906: 3903:
Crime Wars: The Global Intersection of Crime, Political Violence, and International Law
3798: 3421: 3224: 3216: 3177: 2833: 2500: 2461: 2279: 2196: 2027: 1937: 1922: 1897: 1861: 1765: 1651: 1616: 1604: 1550: 1530: 1502: 1432: 1326: 1303: 1019: 836: 826: 475: 455: 407: 388: 318: 215: 7188: 7045: 6883: 6536: 6501: 6237: 6024: 5839: 5576: 5305: 5014: 4683: 4552: 4511:
Hidden Secrets: A Complete History of Espionage and the Technology Used to Support It
4472: 4398: 4380: 4351: 4253: 4241: 4212: 4180: 4074: 4045: 4008: 3983: 3945: 3390: 3302: 3272: 3228: 3169: 2944: 2698: 2430: 2185:
gathering, this may include gathering information of a corporate business venture or
2171: 1510: 1440: 1361: 1216: 1126:, as it is by definition unwelcome. In some circumstances, it may be a legal tool of 998: 972: 857: 480: 348: 313: 3701: 1168:
is the practice of thwarting enemy espionage and intelligence-gathering. Almost all
7101: 6809: 6747: 6642: 6310: 6270: 6135: 6065: 5961: 5909: 5879: 5656: 5631: 5360: 5310: 4979: 4711: 4548: 4233: 4070: 4030: 3937: 3933: 3208: 3161: 2972: 2721: 2591: 2469: 2353: 2224: 1695: 1670: 1514: 947: 905: 900: 757: 651: 546: 241: 63: 2609: 2207:
a foreign service into action, exposing their operations while under surveillance.
7075: 7001: 6677: 6583: 6481: 6410: 6275: 6265: 6217: 6188: 6173: 6125: 6080: 6004: 5935: 5919: 5776: 5736: 5248: 5177: 4999: 4974: 4908: 4870: 4807: 4579: 4432: 4407: 4127: 3837: 3664: 3628: 3584: 3366: 3296: 2997: 2772: 2737: 2725: 2657: 2547: 2285: 2061:
These agents can be moles (who are recruited before they get access to secrets),
1927: 1777: 1773: 1600: 1424: 1353: 1299: 1169: 1127: 1110:. Any individual or spy ring (a cooperating group of spies), in the service of a 1095: 891: 581: 510: 436: 395: 293: 231: 161: 146: 6227: 4534: 2065:(who are recruited after they get access to secrets and leave their country) or 1994: 1634:, while the United States has tended to emphasize technological methods such as 1364:
was America's first spymaster, utilizing espionage tactics against the British.
7085: 7080: 7050: 6874: 6566: 6420: 6300: 6110: 6095: 6047: 5986: 5977: 5950: 5829: 5824: 5771: 5751: 5621: 5345: 5165: 4677: 4539:
Spying Through a Glass Darkly: The Ethics of Espionage and Counter-Intelligence
4416: 4333: 3900: 3382: 3334: 2992: 2819: 2729: 2567: 2543: 2531: 2477: 2449: 2357: 2317: 2204: 2023: 1932: 1851: 1751: 1731: 1676: 1526: 1471: 1436: 1372: 1283: 1275: 1236: 1212: 1194: 1189:
The oldest known classified document was a report made by a spy disguised as a
1003: 961: 520: 515: 485: 378: 67: 1557:
in 1962 implied the legitimacy of some espionage as an arm of foreign policy.
7167: 6819: 6717: 6521: 6471: 6315: 6260: 6232: 6222: 6178: 6100: 6090: 5994: 5945: 5899: 5894: 5874: 5746: 5721: 5711: 5671: 5641: 5636: 5606: 5263: 5243: 5228: 4957: 4925: 4827: 4802: 4721: 4245: 3819: 3212: 3173: 3027: 3002: 2987: 2916: 2849: 2841: 2829: 2815: 2579: 2563: 2555: 2504: 2249: 2015: 1962: 1917: 1727: 1711: 1444: 1404: 1400: 1263: 1220: 1198: 1190: 767: 621: 333: 283: 4598:
Spies, Lies, and Algorithms: The History and Future of American Intelligence
4216: 3841: 2896:
Espionage has also made its way into comedy depictions. The 1960s TV series
7125: 7060: 6667: 6556: 6541: 6320: 6295: 6183: 6140: 6115: 6070: 6052: 5940: 5859: 5849: 5799: 5761: 5701: 5696: 5681: 5676: 5666: 5661: 5651: 5581: 5514: 5350: 5268: 5258: 5199: 5004: 4792: 4777: 4716: 4701: 4694: 4556: 4449: 4390: 4272:(2nd ed. 2018); focus on the 21st century; reprints 30 essays by scholars. 3292: 2940: 2870: 2845: 2788: 2709: 2551: 2523: 2493: 2489: 2417: 2409: 2300: 2282:
information that can help lead to recruitment into an intelligence service.
2267: 2210: 2011: 1967: 1907: 1881: 1866: 1475: 1459: 1420: 1416: 1338: 1334: 1311: 1291: 1242: 1008: 571: 495: 368: 353: 265: 116: 7148: 5032: 4349:
Surveillance Tradecraft: The Professional's Guide to Surveillance Training
4224:
Winkler, Jonathan Reed (July 2009). "Information Warfare in World War I".
2448:
passed the Espionage Act of 1917. Over the years, many spies, such as the
2199:: provides political influence in an area of interest, possibly including 6831: 6827: 6737: 6486: 6400: 6305: 6290: 6145: 6085: 6075: 5999: 5819: 5794: 5766: 5741: 5716: 5646: 5616: 5586: 5160: 4994: 4860: 4706: 4424: 4370: 4328: 2767: 2760: 2677: 2661: 2445: 1747: 1580: 1554: 1534: 1396: 1392: 1349: 1315: 1255: 1247: 1153: 1142: 1023: 779: 775: 641: 298: 227: 151: 4490:
Knowing One's Enemies: Intelligence Assessment Before the Two World Wars
4273: 3840:, Rupa Jha, October 21, 2012, BBC (retrieved 2012-10-20) (Program link: 3220: 3196: 3165: 1462:, the activity of espionage has enlarged, much of it growing out of the 7120: 6906: 6789: 6784: 6662: 6546: 6526: 6516: 6496: 6450: 6425: 6395: 6032: 6014: 5889: 5884: 5626: 5611: 5596: 5233: 4989: 4969: 4962: 4942: 4849: 4453: 4385:
The Second Oldest Profession: Spies and Spying in the Twentieth Century
4237: 4067:
International Law in Historical Perspective: The laws of war. Part IX-A
2887: 2865: 2837: 2776: 2405: 2393: 2200: 2144: 2055: 2035: 1947: 1902: 1891: 1840: 1498: 1271: 1267: 1251: 1111: 1044: 930: 882: 737: 732: 566: 358: 338: 328: 308: 260: 180: 133: 3181: 3149: 7090: 7070: 7055: 6990: 6896: 6862: 6852: 6814: 6752: 6732: 6672: 6647: 6042: 5686: 5571: 5214: 5209: 4984: 4797: 4726: 4375:
Intelligence in War: Knowledge of the Enemy from Napoleon to Al-Qaeda
3301:(in German) (2 ed.). Munich: Koehler & Amelang. p. 38. 2982: 2775:, with a description of the training of an intelligence agent in the 2665: 2649: 2320:
for an established network of agents, usually considered "blue chip".
2278:
Access agent: provides access to other potential agents by providing
2062: 1886: 1743: 1620: 1542: 1452: 1412: 1380: 1367: 1157: 872: 841: 810: 800: 762: 656: 636: 576: 551: 525: 505: 490: 6444: 4591:
The Rise and Fall of Intelligence: An International Security History
3773:"Robert Hanssen, F.B.I. Agent Exposed as Spy for Moscow, Dies at 79" 2240:
occur when an officer has completed his term of service or when his
7010: 6980: 6901: 6847: 6799: 6774: 6756: 6692: 6657: 6628: 6610: 6605: 6588: 6551: 6531: 6168: 5566: 5218: 4832: 3087: 2936: 2705: 2653: 2518:
officer and analyst who committed espionage against his country by
2086: 2034:
who do not know the agent or case officer but transfer messages. A
1957: 1942: 1912: 1564: 1494: 1463: 1287: 1161: 993: 925: 877: 831: 795: 747: 722: 660: 596: 561: 445: 422: 417: 400: 363: 343: 140: 1201:
had a developed secret service, and espionage is mentioned in the
1122:, or independent operation, can commit espionage. The practice is 7110: 6952: 6918: 6888: 6857: 6804: 6779: 6727: 6707: 6702: 6682: 6652: 6615: 6600: 6511: 6476: 6336: 4918: 4601: 3532:
Beijing's spies cost German firms billions, says espionage expert
2686: 2401: 2214: 2131: 2046: 2031: 1479: 1295: 1226:
The thesis that espionage and intelligence has a central role in
1115: 910: 862: 805: 752: 727: 701: 631: 611: 606: 586: 556: 427: 412: 323: 288: 250: 108: 1603:, was particularly feared by Iranian dissidents before the 1979 1356:
achieved their fame as spies, and there was considerable use of
7015: 6842: 6712: 6571: 6405: 6160: 4564: 4436: 4140:
Spyscreen: Espionage on Film and TV from the 1930s to the 1960s
3106:
Journal of Organizational Effectiveness: People and Performance
2932: 2784: 2712:, eight German agents entered the U.S. in June 1942 as part of 2694: 2610:
Government intelligence laws and its distinction from espionage
2527: 2519: 2127: 1654:) officers were judged by the number of agents they recruited. 1568: 1533:. Among Western officials who defected to the Soviet Union are 1448: 1279: 1259: 1250:
European states excelled at what has later been termed counter-
790: 616: 450: 383: 211: 3680: 2931:
Black Widow is also a fictional agent who was introduced as a
2802:
written in 1821, about an American spy in New York during the
6742: 6687: 6637: 6368: 6209: 2534:, who also served a prison sentence until his death in 2023. 1596: 1592: 1584: 1572: 1560: 1231: 1208: 1203: 1131: 646: 591: 541: 54:
deal primarily with the United States and do not represent a
4619: 4529:
Shaw, Tamsin, "Ethical Espionage" (review of Calder Walton,
4403:
Underground Empire: How America Weaponized the World Economy
3901:
Paul Battersby; Joseph M. Siracusa; Sasho Ripiloski (2011).
3340:. Intelligence Resource Program, Central Intelligence Agency 2396:
of many nations. In the United States, it is covered by the
27:"Spy" and "Secret agent" redirect here. For other uses, see 7065: 6794: 4504:
Calculations: net assessment and the coming of World War II
4460: 4428: 4208: 3063:
Spying on United Nations leaders by United States diplomats
2747:
The U.S. codification of enemy spies is Article 106 of the
2554:. In the early 21st century, the act was used to prosecute 1588: 1306:. Venice became obsessed with espionage because successful 1013: 742: 500: 2736:
to prison terms. In 1948, they were released by President
2150:
In popular usage, this term is sometimes confused with an
2030:), supports and directs the human collector. Cut-outs are 4517:
A Century of Spies: Intelligence in the Twentieth Century
4032:
Romantics at War: Glory and Guilt in the Age of Terrorism
3715: 3091: 2957: 2914:
film trilogy portrays an inept spy, while the 1985 movie
2826:
characters that sold well from the 1920s to the present.
2717: 1746:. There are exceptions to physical meetings, such as the 1643: 1483: 1227: 4117:
Neutral Ground: A Political History of Espionage Fiction
3409: 2939:. She later became an agent of the fictional spy agency 2295:
Facilities agent: provides access to buildings, such as
1754:
in never meeting the people who bought his information.
1478:
have had a long tradition of espionage ranging from the
5504:
Counterintelligence and counter-terrorism organizations
4440: 2676:
intelligence about the enemy and communicate it to the
2507:
without the possibility of parole in the high-security
1262:. Inquisitions were marked by centrally organised mass 4531:
Spies: The Epic Intelligence War Between East and West
1666:
Broad areas of espionage targeting expertise include:
4342:
In Spies, We Trust: The Story of Western Intelligence
4331:, "Spy vs. Spy vs. Spy: How valuable is espionage?", 3537: 2424:(FBI), he faced life in prison; his contact, who had 1827:
Britain's espionage activities are controlled by the
6440: 4483:
Encyclopedia of Espionage, Intelligence and Security
3598:"CIA Status Improves Contractor's Case for Immunity" 2274:
Less common or lesser known forms of agent include:
1722:), and analysis of publicly available data sources ( 2108:Communications both are necessary to espionage and 2058:, may attempt to infiltrate a target organization. 16:
Clandestine acquisition of confidential information
4268:Aldrich, Richard J., and Christopher Andrew, eds. 4029: 4027: 4005:The Contemporary Law Of Armed Conflict 2nd Edition 2832:achieved popularity as a fictional agent of early 2480:, and others have been prosecuted under this law. 2181:through the use of special privileges. If used in 1768:". Espionage is a violation of United States law, 1579:had consistently superior intelligence during the 1427:established elaborate espionage nets. In 1942 the 4502:Murray, Williamson, and Allan Reed Millett, eds. 4467:Lerner, Brenda Wilmoth & K. Lee Lerner, eds. 3519:Defectors say China running 1,000 spies in Canada 1358:spies on both sides during the American Civil War 7165: 4481:Lerner, K. Lee and Brenda Wilmoth Lerner, eds. 4064: 2392:Espionage against a nation is a crime under the 4573:Encyclopedia of the Central Intelligence Agency 4302:Intelligence Literature: Suggested Reading List 4002: 3723:"Aldrich Hazen Ames Register Number: 40087-083" 1310:demanded that the city-state could protect its 1102:). A person who commits espionage is called an 3790: 3449: 6352: 5530: 5048: 4635: 4485:(2003), worldwide recent coverage 1100 pages. 4367:, 1996 revised edition. First published 1967. 4316:A Short Course in the Secret War, 4th Edition 3194: 2342:The examples and perspective in this article 1383:and spy, with her chauffeur Boris Wolkowski ( 1219:, when spies employed illiterate subjects in 1064: 52:The examples and perspective in this article 5544: 4452:(... the founder's daughter), had committed 3919: 3546: 3534:". The Sydney Morning Herald. July 25, 2009. 2483: 1834: 1595:, have highly developed operations as well. 5062: 4541:, Oxford University Press, 251 pp., 2024), 4283:The Secret World: A History of Intelligence 3729:. Federal Bureau of Prisons. Archived from 3445: 3443: 3441: 3269:The Secret World: A History of Intelligence 3043:Human intelligence (intelligence gathering) 2635:Painting of French spy captured during the 2597: 1282:became so obsessed with espionage that the 6359: 6345: 5537: 5523: 5055: 5041: 4642: 4628: 4559:) and perhaps support for the anti-Soviet 4205:The Evolution of British Sigint, 1653–1939 3053:List of intelligence gathering disciplines 2167:Among the most common forms of agent are: 1845:List of intelligence gathering disciplines 1701: 1071: 1057: 4533:, Simon and Schuster, 2023, 672 pp.; and 4028:George P. Fletcher (September 16, 2002). 2602:Espionage is illegal in the UK under the 2380:Learn how and when to remove this message 90:Learn how and when to remove this message 5155: 4661: 3964:International Committee of the Red Cross 3888:International Committee of the Red Cross 3796: 3438: 3291: 3147: 2630: 2537: 2270:: works for three intelligence services. 2081:assistance of a controller is required. 1993: 1366: 5469:Scientific & Technical intelligence 4223: 4202: 3694: 3669: 3571: 3381: 3241: 2943:and a member of the superhero team the 2177:Intelligence agent: provides access to 2115: 2076:is also employed for an individual who 1657: 1642:. In the Soviet Union, both political ( 7166: 4892:Chinese espionage in the United States 4555:(a disastrous military fiasco for the 4007:. Juris Publishing, Inc. p. 142. 3679:. John Young Architect. Archived from 3471: 3469: 3467: 3465: 3360:"China's spying seeks secret US info." 3266: 3018:Chinese espionage in the United States 2137: 1718:), aircraft or satellite photography ( 1391:In the 20th century, at the height of 1286:, which was nominally responsible for 1215:. Espionage was also prevalent in the 6340: 5518: 5036: 4623: 4439:... which... seemed poised to supply 3502:"Cyber Espionage to Combat Terrorism" 3195:Ă‘aco del Hoyo, Toni (November 2014). 3118: 3116: 3114: 1278:to collect intelligence. Renaissance 5291:By alliances, nations and industries 4887:Chinese intelligence activity abroad 4469:Terrorism: essential primary sources 4174: 4151: 3267:Andrew, Christopher (28 June 2018). 2935:spy, an antagonist of the superhero 2328: 2004:United States Intelligence Community 1790: 1583:. Some Islamic countries, including 38: 4953:Interpersonal (HUMINT) intelligence 4318:. Madison Books, November 19, 2001. 3926:The Journal of Intelligence History 3600:. New America Media. Archived from 3462: 2412:handed a stack of dossiers of U.S. 2069:(who get access but do not leave). 1740:intelligence collection disciplines 1511:flying a U-2 reconnaissance mission 13: 6366: 4261: 3450:Igor Primoratz (August 15, 2013). 3111: 2584:People's Union for Civil Liberties 2099:International Intelligence Limited 1525:, Peter Deriabin, Pawel Monat and 1466:between the United States and the 1197:, who died in around 1750 BC. The 1094:is the act of obtaining secret or 14: 7200: 4788:Computer and network surveillance 4615:History of an espionage in Russia 4608: 3677:"Aldrich Ames Criminal Complaint" 3332: 2742:American Zone of occupied Germany 2309:: lives in another country under 2164:who recruits and handles agents. 6958:Perverting the course of justice 6443: 6434: 6382:. Not all types are listed here. 4823:Short-range agent communications 4142:(Oxford University Press, 2003). 2868:world as well, in games such as 2749:Uniform Code of Military Justice 2333: 2316:Principal agent: functions as a 1795: 1782:Uniform Code of Military Justice 707:Perverting the course of justice 107: 43: 6698:Intellectual property violation 5439:Words of estimative probability 5301:Operational platforms by nation 4524:The U.S. Intelligence Community 4456:by falsely telling the British 4423:, which then uses high-powered 4344:(2013), covers U.S. and Britain 4226:The Journal of Military History 4168: 4145: 4132: 4109: 4087: 4058: 4021: 3996: 3970: 3952: 3913: 3894: 3876: 3847: 3824: 3812: 3765: 3747: 3651: 3633: 3615: 3590: 3524: 3511: 3494: 3403: 3375: 3352: 3335:"Intelligence in the Civil War" 2963:Federal Bureau of Investigation 2905:Agent 000 and the Deadly Curves 2422:Federal Bureau of Investigation 1989: 1615:Today, spy agencies target the 1320: 602:Intellectual property violation 4405:, Henry Holt, 2023, 288 pp.), 4196: 3938:10.1080/16161262.2006.10555131 3326: 3285: 3260: 3235: 3188: 3141: 3098: 3080: 2978:Cover (intelligence gathering) 2864:Spy fiction has permeated the 2754: 2511:. Ames was formerly a 31-year 1: 4649: 4600:(2022), university textbook. 4270:Secret Intelligence: A Reader 3979:2006 Operational Law Handbook 3797:Gerstein, Josh (2011-03-07). 3587:Mi5.gov. "How spies operate". 3069: 3048:List of intelligence agencies 2812:human interest news reporting 1610: 1330: 33:Secret agent (disambiguation) 6281:Vladimir Mikhaylovich Petrov 4586:, New York, Macmillan, 1962. 4544:The New York Review of Books 4095:"UCMJ – Article 106 – Spies" 3799:"Obama's hard line on leaks" 3074: 1786:National Clandestine Service 1429:Office of Strategic Services 1360:. Though not a spy himself, 937:Ignorantia juris non excusat 7: 7179:Law enforcement occupations 5487:Intelligence cycle security 3831:Your World: The Nowhere Man 3521:". CBC News. June 15, 2005. 3456:Martinus Nijhoff Publishers 3244:"Espionage in Ancient Rome" 3038:History of Soviet espionage 3013:American espionage in China 2968:Central Intelligence Agency 2950: 2791:. An even earlier work was 2509:Allenwood U.S. Penitentiary 2414:Central Intelligence Agency 2356:, discuss the issue on the 2130:is losing $ 12 billion and 1829:Secret Intelligence Service 1599:, the secret police of the 1497:, espionage cases included 1488:Central Intelligence Agency 1164:the enemy in various ways. 1141:purposes. Spying involving 66:, discuss the issue on the 10: 7205: 6723:Possessing stolen property 5707:Julius and Ethel Rosenberg 4458:financial services company 4289:Burnham, Frederick Russell 4038:Princeton University Press 3907:Greenwood Publishing Group 3859:MI5 - the Security Service 2758: 2604:National Security Act 2023 2303:operations, resupply, etc. 2119: 2010:" is more common usage. A 1838: 1541:of Great Britain in 1951, 1258:were staged to annihilate 1179: 1175: 627:Possessing stolen property 275:Offense against the person 25: 21:Espionage (disambiguation) 18: 7135: 7100: 7000: 6967: 6916: 6872: 6766: 6626: 6460: 6432: 6388: 6375: 6256:Alexander Gregory Barmine 6246: 6207: 6158: 6061: 6023: 5985: 5975: 5928: 5785: 5559: 5550: 5477: 5419: 5379: 5324: 5281: 5146: 5108: 5088: 5079: 5070: 4879: 4848: 4758: 4735: 4657: 4154:"The Emperor and the Spy" 4065:J. H. W. Verziji (1978). 3663:December 3, 2012, at the 3627:December 3, 2012, at the 3556:. cia.gov. Archived from 3271:. Penguin Books Limited. 3150:"Spies in Ancient Greece" 2664:and punishment—including 2484:History of espionage laws 1835:Technology and techniques 1804:This article needs to be 1623:as well as state actors. 1545:of West Germany in 1954, 1290:, did not even allow the 1130:and in others, it may be 921:Diminished responsibility 715:Crimes against the public 6822:(such as prohibition of 5815:Thomas Patrick Cavanaugh 5545:Soviet and Russian spies 4421:National Security Agency 4340:Jeffreys-Jones, Rhodri. 4003:Leslie C. Green (2000). 3583:January 6, 2011, at the 3481:International Spy Museum 3411:US Department of Defense 3213:10.1177/0968344513505528 3148:Richmond, J. A. (1998). 3128:International Spy Museum 2902:, the 1983 Finnish film 2771:by the English novelist 2673:Hague Convention of 1907 2598:Espionage laws in the UK 2588:Human Rights Law Network 2408:were. For example, when 2043:clandestine cell systems 1780:and Article 106a of the 1730:, reports from military 1632:research in open sources 1096:confidential information 850:Crimes against the state 770:(such as prohibition of 5454:Intelligence assessment 5444:All-source intelligence 5064:Intelligence management 4773:Covert listening device 4743:Intelligence assessment 4584:The Zimmermann Telegram 4522:Richelson, Jeffery T. 4515:Richelson, Jeffery T. 4488:May, Ernest R. (ed.). 4446:chief financial officer 4179:. Horizon Productions. 4177:The Emperor and the Spy 4158:TheEmperorAndTheSpy.com 3477:"Language of Espionage" 3033:Intelligence assessment 2925:The Emperor and the Spy 1872:Covert listening device 1750:, or the insistence of 1702:Methods and terminology 1474:and its successor, the 1134:and punishable by law. 534:Crimes against property 224:(also called violation) 7184:Positions of authority 6938:Miscarriage of justice 6131:John Alexander Symonds 5956:Harold James Nicholson 5810:Christopher John Boyce 5138:Operational techniques 5093:Special reconnaissance 4526:(1999, fourth edition) 4203:Johnson, John (1997). 4175:Katz, Stan S. (2019). 4152:Katz, Stan S. (2019). 3242:ehoward (2006-06-12). 2660:status and subject to 2644: 2626: 2324: 2183:corporate intelligence 2158:intelligence operative 2110:clandestine operations 2095:SCG International Risk 1999: 1761:Black's Law Dictionary 1738:Unlike other forms of 1388: 1294:to consult government 1234:was first advanced in 1092:intelligence gathering 986:Other common-law areas 819:Crimes against animals 687:Miscarriage of justice 669:Crimes against justice 6933:Malfeasance in office 6378:Note: Crimes vary by 6194:Stephen Joseph Ratkai 5022:Targeted surveillance 4570:Smith, W. Thomas Jr. 4099:About.com US Military 3757:. FBI. Archived from 3365:May 19, 2011, at the 3058:Military intelligence 3023:Clandestine operation 2923:The historical novel 2793:James Fenimore Cooper 2734:Franklin D. Roosevelt 2634: 2538:Use against non-spies 2466:Robert Philip Hanssen 2444:The United States in 2398:Espionage Act of 1917 2191:economic intelligence 2179:sensitive information 1997: 1973:Surveillance aircraft 1648:military intelligence 1577:Vietnamese communists 1409:Espionage Act of 1917 1370: 1156:. They can also find 1120:criminal organization 892:Defenses to liability 682:Malfeasance in office 7026:Cybersex trafficking 6790:Censorship violation 5732:Nadezhda Ulanovskaya 5459:Medical intelligence 5429:Competing hypotheses 5239:Industrial espionage 5224:Denial and deception 4948:Industrial espionage 4748:competing hypotheses 4298:Felix, Christopher 3855:"What is espionage?" 3755:"Aldrich Hazen Ames" 3358:Arrillaga, Pauline. 3108:, 2(2), pp. 134–156. 3008:Undercover operation 2883:No One Lives Forever 2824:private investigator 2740:and deported to the 2641:Alphonse de Neuville 2560:Thomas Andrews Drake 2436:Hugh Francis Redmond 2416:(CIA) agents in the 2362:create a new article 2354:improve this article 2344:may not represent a 2299:or offices used for 2258:deep cover operative 2153:intelligence officer 2122:Industrial espionage 2116:Industrial espionage 1978:Surveillance balloon 1658:Targets of espionage 1439:-Messner Group, the 1431:was founded by Gen. 1182:History of espionage 1147:industrial espionage 738:Censorship violation 461:Cybersex trafficking 72:create a new article 64:improve this article 29:Spy (disambiguation) 19:For other uses, see 6820:Illegal consumption 6492:Criminal negligence 5915:John Anthony Walker 5865:Clayton J. Lonetree 5805:David Sheldon Boone 5727:Alexander Ulanovsky 5692:William Ward Pigman 5492:Counterintelligence 5407:Technical (TECHINT) 5402:Open-source (OSINT) 5392:Geospatial (GEOINT) 5366:Casualty estimation 4580:Tuchman, Barbara W. 4561:Solidarity movement 4279:Andrew, Christopher 3818:See the article on 3647:on 3 December 2012. 3387:Inside the Aquarium 3298:Verschlusssache BND 2714:Operation Pastorius 2637:Franco-Prussian War 2572:Stephen Jin-Woo Kim 2516:counterintelligence 2474:John Anthony Walker 2426:diplomatic immunity 2138:Agents in espionage 1953:Side channel attack 1857:Biographic leverage 1692:Counterintelligence 1686:Military capability 1507:Francis Gary Powers 1346:American Revolution 1308:international trade 1270:installed resident 1166:Counterintelligence 916:Defense of property 768:Illegal consumption 304:Criminal negligence 204:Severity of offense 7021:Child sexual abuse 6986:Wildlife smuggling 6976:Cruelty to animals 6767:Against the public 6596:Negligent homicide 6507:False imprisonment 6462:Against the person 6286:Fyodor Raskolnikov 6121:Michael John Smith 5855:Andrew Daulton Lee 5845:Robert Lee Johnson 5757:Harry Dexter White 5592:Whittaker Chambers 5464:Military geography 5449:Basic intelligence 5387:Financial (FININT) 5328:signature (MASINT) 5254:One-way voice link 5190:Concealment device 4899:Cold War espionage 4866:Front organization 4840:Surveillance tools 4818:Phone surveillance 4813:One-way voice link 4768:Concealment device 4471:Thomas Gale 2006 4413:fiber-optic cables 4381:Knightley, Phillip 4321:Friedman, George. 4238:10.1353/jmh.0.0324 4126:2019-03-27 at the 3836:2019-09-15 at the 3777:The New York Times 3231:– via JSTOR. 2834:Cold War espionage 2795:'s classic novel, 2645: 2501:Aldrich Hazen Ames 2462:Aldrich Hazen Ames 2458:the Rosenberg ring 2454:Robert Lee Johnson 2280:offender profiling 2197:Agent-of-influence 2067:defectors in place 2028:non-official cover 2000: 1938:One-way voice link 1923:Non-official cover 1898:Front organisation 1862:Concealment device 1617:illegal drug trade 1605:Iranian Revolution 1551:Bernon F. Mitchell 1503:Whittaker Chambers 1433:William J. Donovan 1389: 1327:Francis Walsingham 837:Wildlife smuggling 827:Cruelty to animals 456:Child sexual abuse 408:Negligent homicide 319:False imprisonment 216:Indictable offense 160:Scope of criminal 7161: 7160: 7144:Wikimedia Commons 7102:Inchoate offenses 7046:Indecent exposure 6537:Human trafficking 6502:Domestic violence 6334: 6333: 6154: 6153: 6025:Portland spy ring 5971: 5970: 5840:Edward Lee Howard 5577:Elizabeth Bentley 5512: 5511: 5415: 5414: 5306:Direction finding 5296:In modern history 5277: 5276: 5030: 5029: 4684:Agent provocateur 4589:Warner, Michael. 4553:Soviet-Afghan War 4495:O'Toole, George. 4477:978-1-4144-0621-3 4444:data to that 's 4356:978-0-9535378-2-2 4186:978-0-9903349-4-1 4080:978-90-286-0148-2 4014:978-1-929446-03-2 3396:978-0-425-09474-7 3166:10.1093/gr/45.1.1 3154:Greece & Rome 3124:"Espionage Facts" 2804:Revolutionary War 2722:military tribunal 2699:international law 2682:lawful combatants 2431:persona non grata 2390: 2389: 2382: 2364:, as appropriate. 2311:false credentials 2172:Agent provocateur 2020:diplomatic status 1928:Numbers messaging 1825: 1824: 1710:). Codebreaking ( 1677:Popular sentiment 1671:Natural resources 1547:William H. Martin 1539:Donald D. Maclean 1519:Victor Kravchenko 1458:Since the end of 1441:French Resistance 1362:George Washington 1217:Greco-Roman world 1199:ancient Egyptians 1081: 1080: 481:Indecent exposure 349:Human trafficking 314:Domestic violence 242:Inchoate offenses 100: 99: 92: 74:, as appropriate. 7196: 6810:Ethnic cleansing 6748:Trespass to land 6643:Arms trafficking 6453: 6448: 6447: 6438: 6361: 6354: 6347: 6338: 6337: 6326:Stig Wennerström 6271:Walter Krivitsky 6136:Edith Tudor-Hart 6066:Michael Bettaney 5983: 5982: 5962:Illegals Program 5910:George Trofimoff 5880:Earl Edwin Pitts 5657:William Malisoff 5632:David Greenglass 5560:1940s and before 5557: 5556: 5539: 5532: 5525: 5516: 5515: 5311:Traffic analysis 5283:Signals (SIGINT) 5118:Asset recruiting 5086: 5085: 5077: 5076: 5057: 5050: 5043: 5034: 5033: 4644: 4637: 4630: 4621: 4620: 4347:Jenkins, Peter. 4314: 4312: 4310: 4257: 4220: 4191: 4190: 4172: 4166: 4165: 4160:. Archived from 4149: 4143: 4136: 4130: 4115:Brett F. Woods, 4113: 4107: 4106: 4101:. Archived from 4091: 4085: 4084: 4071:Brill Publishers 4062: 4056: 4055: 4035: 4025: 4019: 4018: 4000: 3994: 3993: 3974: 3968: 3967: 3956: 3950: 3949: 3922:Natzweiler Trial 3917: 3911: 3910: 3898: 3892: 3891: 3880: 3874: 3873: 3871: 3870: 3861:. Archived from 3851: 3845: 3828: 3822: 3816: 3810: 3809: 3807: 3806: 3794: 3788: 3787: 3785: 3783: 3769: 3763: 3762: 3751: 3745: 3741: 3739: 3738: 3719: 3713: 3712: 3710: 3709: 3698: 3692: 3691: 3689: 3688: 3673: 3667: 3655: 3649: 3648: 3643:. Archived from 3637: 3631: 3619: 3613: 3612: 3610: 3609: 3594: 3588: 3575: 3569: 3568: 3566: 3565: 3550: 3544: 3541: 3535: 3528: 3522: 3515: 3509: 3508: 3506: 3498: 3492: 3491: 3489: 3487: 3473: 3460: 3459: 3447: 3436: 3435: 3433: 3432: 3426: 3420:. Archived from 3419: 3407: 3401: 3400: 3379: 3373: 3356: 3350: 3349: 3347: 3345: 3339: 3330: 3324: 3323: 3317: 3315: 3289: 3283: 3282: 3264: 3258: 3257: 3255: 3254: 3239: 3233: 3232: 3192: 3186: 3185: 3145: 3139: 3138: 3136: 3134: 3120: 3109: 3102: 3096: 3095: 3084: 2973:Covert operation 2787:in 19th century 2592:Kashmir conflict 2470:Jonathan Pollard 2385: 2378: 2374: 2371: 2365: 2337: 2336: 2329: 2292:in an operation. 1820: 1817: 1811: 1799: 1798: 1791: 1766:national defense 1515:Walter Krivitsky 1332: 1324: 1323: 1558–1603 1322: 1300:official secrets 1193:in the court of 1191:diplomatic envoy 1170:sovereign states 1073: 1066: 1059: 1030: 901:Actual innocence 758:Ethnic cleansing 652:Trespass to land 547:Arms trafficking 111: 104: 103: 95: 88: 84: 81: 75: 47: 46: 39: 36: 7204: 7203: 7199: 7198: 7197: 7195: 7194: 7193: 7164: 7163: 7162: 7157: 7131: 7130: 7129: 7096: 7095: 7094: 7076:Sex trafficking 7002:Sexual offenses 6996: 6995: 6994: 6968:Against animals 6963: 6962: 6961: 6912: 6911: 6910: 6868: 6867: 6866: 6762: 6761: 6760: 6678:False pretenses 6622: 6621: 6620: 6584:Preterintention 6456: 6449: 6442: 6439: 6430: 6384: 6371: 6365: 6335: 6330: 6276:Kerttu Nuorteva 6266:Dieter Gerhardt 6248: 6242: 6218:Hirohide Ishida 6203: 6189:Gerda Munsinger 6174:Jeffrey Delisle 6150: 6126:Dave Springhall 6081:Litzi Friedmann 6057: 6019: 6005:John Cairncross 5967: 5936:Evgeny Buryakov 5924: 5920:Jerry Whitworth 5905:Robert Thompson 5781: 5777:Anatoli Yatskov 5737:Julian Wadleigh 5546: 5543: 5513: 5508: 5473: 5411: 5397:Imagery (IMINT) 5375: 5336:Electro-optical 5327: 5326:Measurement and 5320: 5273: 5249:Numbers station 5178:Black operation 5142: 5104: 5066: 5061: 5031: 5026: 5000:Sting operation 4909:Black operation 4875: 4871:Limited hangout 4853: 4844: 4808:Numbers station 4760: 4754: 4731: 4671: 4653: 4648: 4611: 4606: 4596:Zegart, Amy B. 4408:Foreign Affairs 4387:, Norton, 1986. 4308: 4306: 4299: 4264: 4262:Further reading 4199: 4194: 4187: 4173: 4169: 4150: 4146: 4137: 4133: 4128:Wayback Machine 4114: 4110: 4093: 4092: 4088: 4081: 4073:. p. 143. 4063: 4059: 4052: 4026: 4022: 4015: 4001: 3997: 3990: 3982:. DIANE. 2010. 3976: 3975: 3971: 3958: 3957: 3953: 3918: 3914: 3899: 3895: 3882: 3881: 3877: 3868: 3866: 3853: 3852: 3848: 3842:The Nowhere Man 3838:Wayback Machine 3829: 3825: 3817: 3813: 3804: 3802: 3795: 3791: 3781: 3779: 3771: 3770: 3766: 3753: 3752: 3748: 3743:(Search result) 3736: 3734: 3721: 3720: 3716: 3707: 3705: 3700: 3699: 3695: 3686: 3684: 3675: 3674: 3670: 3665:Wayback Machine 3656: 3652: 3639: 3638: 3634: 3629:Wayback Machine 3620: 3616: 3607: 3605: 3596: 3595: 3591: 3585:Wayback Machine 3576: 3572: 3563: 3561: 3552: 3551: 3547: 3542: 3538: 3529: 3525: 3516: 3512: 3504: 3500: 3499: 3495: 3485: 3483: 3475: 3474: 3463: 3448: 3439: 3430: 3428: 3424: 3417: 3408: 3404: 3397: 3383:Suvorov, Victor 3380: 3376: 3367:Wayback Machine 3357: 3353: 3343: 3341: 3337: 3333:Allen, Thomas. 3331: 3327: 3313: 3311: 3309: 3290: 3286: 3279: 3265: 3261: 3252: 3250: 3240: 3236: 3193: 3189: 3146: 3142: 3132: 3130: 3122: 3121: 3112: 3103: 3099: 3086: 3085: 3081: 3077: 3072: 3067: 2998:Secret identity 2953: 2773:Rudyard Kipling 2763: 2757: 2738:Harry S. Truman 2726:Washington D.C. 2658:prisoner-of-war 2629: 2612: 2600: 2548:Father Coughlin 2540: 2492:; for example, 2486: 2428:, was declared 2386: 2375: 2369: 2366: 2351: 2338: 2334: 2327: 2286:Confusion agent 2252:: recruited to 2225:Redoubled agent 2187:stock portfolio 2140: 2124: 2118: 2018:, who may have 1992: 1982: 1847: 1837: 1821: 1815: 1812: 1809: 1800: 1796: 1704: 1660: 1613: 1601:Pahlavi dynasty 1523:Vladimir Petrov 1451:and the Polish 1354:Benedict Arnold 1319: 1302:could face the 1184: 1178: 1128:law enforcement 1104:espionage agent 1077: 1018: 582:False pretenses 511:Sex trafficking 437:Sexual offenses 396:Preterintention 232:Summary offense 96: 85: 79: 76: 61: 48: 44: 37: 26: 24: 17: 12: 11: 5: 7202: 7192: 7191: 7186: 7181: 7176: 7159: 7158: 7156: 7151: 7146: 7141: 7136: 7133: 7132: 7128: 7123: 7118: 7113: 7108: 7107: 7106: 7104: 7098: 7097: 7093: 7088: 7086:Sexual slavery 7083: 7081:Sexual assault 7078: 7073: 7068: 7063: 7058: 7053: 7048: 7043: 7038: 7033: 7028: 7023: 7018: 7013: 7008: 7007: 7006: 7004: 6998: 6997: 6993: 6988: 6983: 6978: 6973: 6972: 6971: 6969: 6965: 6964: 6960: 6955: 6950: 6945: 6940: 6935: 6930: 6925: 6924: 6923: 6921: 6914: 6913: 6909: 6904: 6899: 6894: 6891: 6886: 6881: 6880: 6879: 6877: 6870: 6869: 6865: 6860: 6855: 6850: 6845: 6840: 6835: 6817: 6812: 6807: 6805:Hostage-taking 6802: 6797: 6792: 6787: 6782: 6777: 6772: 6771: 6770: 6768: 6764: 6763: 6759: 6750: 6745: 6740: 6735: 6730: 6725: 6720: 6715: 6710: 6705: 6700: 6695: 6690: 6685: 6680: 6675: 6670: 6665: 6660: 6655: 6650: 6645: 6640: 6635: 6634: 6633: 6631: 6624: 6623: 6619: 6618: 6613: 6608: 6603: 6598: 6593: 6592: 6591: 6581: 6580: 6579: 6569: 6564: 6554: 6549: 6544: 6539: 6534: 6529: 6524: 6519: 6514: 6509: 6504: 6499: 6494: 6489: 6484: 6479: 6474: 6468: 6467: 6466: 6464: 6458: 6457: 6455: 6454: 6433: 6431: 6429: 6428: 6423: 6418: 6413: 6408: 6403: 6398: 6392: 6390: 6386: 6385: 6376: 6373: 6372: 6364: 6363: 6356: 6349: 6341: 6332: 6331: 6329: 6328: 6323: 6318: 6313: 6308: 6303: 6301:Vitaly Shlykov 6298: 6293: 6288: 6283: 6278: 6273: 6268: 6263: 6258: 6252: 6250: 6249:in combination 6244: 6243: 6241: 6240: 6235: 6230: 6225: 6220: 6214: 6212: 6205: 6204: 6202: 6201: 6196: 6191: 6186: 6181: 6176: 6171: 6165: 6163: 6156: 6155: 6152: 6151: 6149: 6148: 6143: 6138: 6133: 6128: 6123: 6118: 6113: 6111:Geoffrey Prime 6108: 6103: 6098: 6096:Melita Norwood 6093: 6088: 6083: 6078: 6073: 6068: 6062: 6059: 6058: 6056: 6055: 6050: 6048:Harry Houghton 6045: 6040: 6035: 6029: 6027: 6021: 6020: 6018: 6017: 6012: 6010:Donald Maclean 6007: 6002: 5997: 5991: 5989: 5987:Cambridge Five 5980: 5973: 5972: 5969: 5968: 5966: 5965: 5958: 5953: 5951:Robert Hanssen 5948: 5943: 5938: 5932: 5930: 5926: 5925: 5923: 5922: 5917: 5912: 5907: 5902: 5897: 5892: 5887: 5882: 5877: 5872: 5870:Richard Miller 5867: 5862: 5857: 5852: 5847: 5842: 5837: 5835:Reino Häyhänen 5832: 5830:Robert Hanssen 5827: 5825:James Hall III 5822: 5817: 5812: 5807: 5802: 5797: 5791: 5789: 5783: 5782: 5780: 5779: 5774: 5772:Flora Wovschin 5769: 5764: 5759: 5754: 5752:Nathaniel Weyl 5749: 5744: 5739: 5734: 5729: 5724: 5719: 5714: 5709: 5704: 5699: 5694: 5689: 5684: 5679: 5674: 5669: 5664: 5659: 5654: 5649: 5644: 5639: 5634: 5629: 5624: 5622:Harold Glasser 5619: 5614: 5609: 5604: 5599: 5594: 5589: 5584: 5579: 5574: 5569: 5563: 5561: 5554: 5548: 5547: 5542: 5541: 5534: 5527: 5519: 5510: 5509: 5507: 5506: 5501: 5500: 5499: 5489: 5483: 5481: 5475: 5474: 5472: 5471: 5466: 5461: 5456: 5451: 5446: 5441: 5436: 5434:Target-centric 5431: 5425: 5423: 5417: 5416: 5413: 5412: 5410: 5409: 5404: 5399: 5394: 5389: 5383: 5381: 5377: 5376: 5374: 5373: 5363: 5358: 5356:Radiofrequency 5353: 5348: 5343: 5338: 5332: 5330: 5322: 5321: 5319: 5318: 5313: 5308: 5303: 5298: 5293: 5287: 5285: 5279: 5278: 5275: 5274: 5272: 5271: 5266: 5261: 5256: 5251: 5246: 5241: 5236: 5231: 5226: 5221: 5212: 5207: 5202: 5197: 5192: 5187: 5186: 5185: 5175: 5170: 5169: 5168: 5163: 5152: 5150: 5144: 5143: 5141: 5140: 5135: 5130: 5125: 5120: 5114: 5112: 5106: 5105: 5103: 5102: 5101: 5100: 5089: 5083: 5081:Human (HUMINT) 5074: 5068: 5067: 5060: 5059: 5052: 5045: 5037: 5028: 5027: 5025: 5024: 5019: 5018: 5017: 5012: 5002: 4997: 4992: 4987: 4982: 4977: 4972: 4967: 4966: 4965: 4960: 4950: 4945: 4940: 4939: 4938: 4933: 4923: 4922: 4921: 4916: 4906: 4901: 4896: 4895: 4894: 4883: 4881: 4877: 4876: 4874: 4873: 4868: 4863: 4857: 4855: 4846: 4845: 4843: 4842: 4837: 4836: 4835: 4825: 4820: 4815: 4810: 4805: 4800: 4795: 4790: 4785: 4780: 4775: 4770: 4764: 4762: 4761:communications 4756: 4755: 4753: 4752: 4751: 4750: 4739: 4737: 4733: 4732: 4730: 4729: 4724: 4719: 4714: 4709: 4704: 4699: 4698: 4697: 4687: 4680: 4678:Agent handling 4674: 4672: 4670: 4669: 4664: 4658: 4655: 4654: 4647: 4646: 4639: 4632: 4624: 4618: 4617: 4610: 4609:External links 4607: 4605: 4604: 4602:online reviews 4594: 4587: 4577: 4568: 4527: 4520: 4513: 4507: 4500: 4493: 4486: 4479: 4465: 4399:Abraham Newman 4388: 4378: 4368: 4358: 4345: 4338: 4334:The New Yorker 4326: 4319: 4296: 4293:Taking Chances 4286: 4276: 4265: 4263: 4260: 4259: 4258: 4232:(3): 845–867. 4221: 4198: 4195: 4193: 4192: 4185: 4167: 4164:on 2019-09-26. 4144: 4138:Miller, Toby, 4131: 4108: 4105:on 2013-05-15. 4086: 4079: 4057: 4050: 4020: 4013: 3995: 3988: 3969: 3951: 3912: 3909:. p. 125. 3893: 3875: 3846: 3823: 3811: 3801:. politico.com 3789: 3764: 3761:on 2010-10-13. 3746: 3714: 3693: 3668: 3650: 3632: 3614: 3589: 3570: 3554:"Double Agent" 3545: 3536: 3523: 3510: 3493: 3461: 3458:. p. 214. 3437: 3413:(2007-07-12). 3402: 3395: 3374: 3351: 3325: 3307: 3284: 3277: 3259: 3234: 3207:(4): 401–421. 3201:War in History 3187: 3140: 3110: 3097: 3078: 3076: 3073: 3071: 3068: 3066: 3065: 3060: 3055: 3050: 3045: 3040: 3035: 3030: 3025: 3020: 3015: 3010: 3005: 3000: 2995: 2993:Secret service 2990: 2985: 2980: 2975: 2970: 2965: 2960: 2954: 2952: 2949: 2911:Johnny English 2759:Main article: 2756: 2753: 2730:electric chair 2628: 2625: 2611: 2608: 2599: 2596: 2568:Edward Snowden 2556:whistleblowers 2544:Eugene V. Debs 2539: 2536: 2532:Robert Hanssen 2485: 2482: 2478:James Hall III 2450:Soble spy ring 2388: 2387: 2348:of the subject 2346:worldwide view 2341: 2339: 2332: 2326: 2323: 2322: 2321: 2314: 2304: 2293: 2283: 2272: 2271: 2265: 2247: 2246: 2245: 2228: 2208: 2194: 2175: 2139: 2136: 2120:Main article: 2117: 2114: 2024:official cover 1991: 1988: 1981: 1980: 1975: 1970: 1965: 1960: 1955: 1950: 1945: 1940: 1935: 1933:Official cover 1930: 1925: 1920: 1915: 1910: 1905: 1900: 1895: 1889: 1884: 1879: 1874: 1869: 1864: 1859: 1854: 1852:Agent handling 1848: 1836: 1833: 1823: 1822: 1803: 1801: 1794: 1770:18 U.S.C. 1752:Robert Hanssen 1732:reconnaissance 1703: 1700: 1699: 1698: 1689: 1683: 1680: 1674: 1659: 1656: 1612: 1609: 1527:Oleg Penkovsky 1472:Russian Empire 1425:Imperial Japan 1373:Minna Craucher 1314:. Under Queen 1284:Council of Ten 1276:capital cities 1264:interrogations 1254:when Catholic 1237:The Art of War 1221:civil services 1213:Amarna letters 1195:King Hammurabi 1180:Main article: 1177: 1174: 1079: 1078: 1076: 1075: 1068: 1061: 1053: 1050: 1049: 1048: 1047: 1039: 1038: 1034: 1033: 1032: 1031: 1016: 1011: 1006: 1001: 996: 988: 987: 983: 982: 981: 980: 975: 970: 965: 955: 950: 945: 940: 933: 928: 923: 918: 913: 908: 903: 895: 894: 888: 887: 886: 885: 880: 875: 870: 865: 860: 852: 851: 847: 846: 845: 844: 839: 834: 829: 821: 820: 816: 815: 814: 813: 808: 803: 798: 793: 788: 783: 765: 760: 755: 753:Hostage-taking 750: 745: 740: 735: 730: 725: 717: 716: 712: 711: 710: 709: 704: 699: 694: 689: 684: 679: 671: 670: 666: 665: 664: 663: 654: 649: 644: 639: 634: 629: 624: 619: 614: 609: 604: 599: 594: 589: 584: 579: 574: 569: 564: 559: 554: 549: 544: 536: 535: 531: 530: 529: 528: 523: 521:Sexual slavery 518: 516:Sexual assault 513: 508: 503: 498: 493: 488: 483: 478: 473: 468: 463: 458: 453: 448: 440: 439: 433: 432: 431: 430: 425: 420: 415: 410: 405: 404: 403: 393: 392: 391: 381: 376: 366: 361: 356: 351: 346: 341: 336: 331: 326: 321: 316: 311: 306: 301: 296: 291: 286: 278: 277: 271: 270: 269: 268: 263: 258: 253: 245: 244: 238: 237: 236: 235: 225: 219: 206: 205: 201: 200: 199: 198: 193: 188: 183: 178: 173: 165: 164: 157: 156: 155: 154: 149: 144: 137: 127: 126: 120: 119: 113: 112: 98: 97: 58:of the subject 56:worldwide view 51: 49: 42: 15: 9: 6: 4: 3: 2: 7201: 7190: 7187: 7185: 7182: 7180: 7177: 7175: 7172: 7171: 7169: 7155: 7152: 7150: 7147: 7145: 7142: 7140: 7137: 7134: 7127: 7124: 7122: 7119: 7117: 7114: 7112: 7109: 7105: 7103: 7099: 7092: 7089: 7087: 7084: 7082: 7079: 7077: 7074: 7072: 7069: 7067: 7064: 7062: 7059: 7057: 7054: 7052: 7049: 7047: 7044: 7042: 7039: 7037: 7036:Homosexuality 7034: 7032: 7029: 7027: 7024: 7022: 7019: 7017: 7014: 7012: 7009: 7005: 7003: 6999: 6992: 6989: 6987: 6984: 6982: 6979: 6977: 6974: 6970: 6966: 6959: 6956: 6954: 6951: 6949: 6946: 6944: 6941: 6939: 6936: 6934: 6931: 6929: 6926: 6922: 6920: 6915: 6908: 6905: 6903: 6900: 6898: 6895: 6892: 6890: 6887: 6885: 6882: 6878: 6876: 6871: 6864: 6861: 6859: 6856: 6854: 6851: 6849: 6846: 6844: 6841: 6839: 6838:Miscegenation 6836: 6833: 6829: 6825: 6821: 6818: 6816: 6813: 6811: 6808: 6806: 6803: 6801: 6798: 6796: 6793: 6791: 6788: 6786: 6783: 6781: 6778: 6776: 6773: 6769: 6765: 6758: 6754: 6751: 6749: 6746: 6744: 6741: 6739: 6736: 6734: 6731: 6729: 6726: 6724: 6721: 6719: 6718:Pickpocketing 6716: 6714: 6711: 6709: 6706: 6704: 6701: 6699: 6696: 6694: 6691: 6689: 6686: 6684: 6681: 6679: 6676: 6674: 6671: 6669: 6666: 6664: 6661: 6659: 6656: 6654: 6651: 6649: 6646: 6644: 6641: 6639: 6636: 6632: 6630: 6625: 6617: 6614: 6612: 6609: 6607: 6604: 6602: 6599: 6597: 6594: 6590: 6587: 6586: 6585: 6582: 6578: 6575: 6574: 6573: 6570: 6568: 6565: 6562: 6558: 6555: 6553: 6550: 6548: 6545: 6543: 6540: 6538: 6535: 6533: 6530: 6528: 6525: 6523: 6522:Home invasion 6520: 6518: 6515: 6513: 6510: 6508: 6505: 6503: 6500: 6498: 6495: 6493: 6490: 6488: 6485: 6483: 6480: 6478: 6475: 6473: 6472:Assassination 6470: 6469: 6465: 6463: 6459: 6452: 6446: 6441: 6437: 6427: 6424: 6422: 6419: 6417: 6414: 6412: 6409: 6407: 6404: 6402: 6399: 6397: 6394: 6393: 6391: 6387: 6383: 6381: 6374: 6370: 6362: 6357: 6355: 6350: 6348: 6343: 6342: 6339: 6327: 6324: 6322: 6319: 6317: 6316:Richard Sorge 6314: 6312: 6311:Siddiq Ghouse 6309: 6307: 6304: 6302: 6299: 6297: 6294: 6292: 6289: 6287: 6284: 6282: 6279: 6277: 6274: 6272: 6269: 6267: 6264: 6262: 6261:Stig Bergling 6259: 6257: 6254: 6253: 6251: 6245: 6239: 6236: 6234: 6233:Hotsumi Ozaki 6231: 6229: 6226: 6224: 6223:Yotoku Miyagi 6221: 6219: 6216: 6215: 6213: 6211: 6206: 6200: 6197: 6195: 6192: 6190: 6187: 6185: 6182: 6180: 6179:Igor Gouzenko 6177: 6175: 6172: 6170: 6167: 6166: 6164: 6162: 6157: 6147: 6144: 6142: 6139: 6137: 6134: 6132: 6129: 6127: 6124: 6122: 6119: 6117: 6114: 6112: 6109: 6107: 6104: 6102: 6101:Alan Nunn May 6099: 6097: 6094: 6092: 6091:Percy Glading 6089: 6087: 6084: 6082: 6079: 6077: 6074: 6072: 6069: 6067: 6064: 6063: 6060: 6054: 6051: 6049: 6046: 6044: 6041: 6039: 6036: 6034: 6031: 6030: 6028: 6026: 6022: 6016: 6013: 6011: 6008: 6006: 6003: 6001: 5998: 5996: 5995:Anthony Blunt 5993: 5992: 5990: 5988: 5984: 5981: 5979: 5974: 5964: 5963: 5959: 5957: 5954: 5952: 5949: 5947: 5946:Peter Debbins 5944: 5942: 5939: 5937: 5934: 5933: 5931: 5927: 5921: 5918: 5916: 5913: 5911: 5908: 5906: 5903: 5901: 5900:Oscar Seborer 5898: 5896: 5895:Robert Soblen 5893: 5891: 5888: 5886: 5883: 5881: 5878: 5876: 5875:Ronald Pelton 5873: 5871: 5868: 5866: 5863: 5861: 5858: 5856: 5853: 5851: 5848: 5846: 5843: 5841: 5838: 5836: 5833: 5831: 5828: 5826: 5823: 5821: 5818: 5816: 5813: 5811: 5808: 5806: 5803: 5801: 5798: 5796: 5793: 5792: 5790: 5788: 5784: 5778: 5775: 5773: 5770: 5768: 5765: 5763: 5760: 5758: 5755: 5753: 5750: 5748: 5747:Bill Weisband 5745: 5743: 5740: 5738: 5735: 5733: 5730: 5728: 5725: 5723: 5722:Morton Sobell 5720: 5718: 5715: 5713: 5712:Alfred Sarant 5710: 5708: 5705: 5703: 5700: 5698: 5695: 5693: 5690: 5688: 5685: 5683: 5680: 5678: 5675: 5673: 5672:Isaiah Oggins 5670: 5668: 5665: 5663: 5660: 5658: 5655: 5653: 5650: 5648: 5645: 5643: 5642:John Herrmann 5640: 5638: 5637:Theodore Hall 5635: 5633: 5630: 5628: 5625: 5623: 5620: 5618: 5615: 5613: 5610: 5608: 5607:Judith Coplon 5605: 5603: 5600: 5598: 5595: 5593: 5590: 5588: 5585: 5583: 5580: 5578: 5575: 5573: 5570: 5568: 5565: 5564: 5562: 5558: 5555: 5553: 5549: 5540: 5535: 5533: 5528: 5526: 5521: 5520: 5517: 5505: 5502: 5498: 5497:organizations 5495: 5494: 5493: 5490: 5488: 5485: 5484: 5482: 5480: 5479:Dissemination 5476: 5470: 5467: 5465: 5462: 5460: 5457: 5455: 5452: 5450: 5447: 5445: 5442: 5440: 5437: 5435: 5432: 5430: 5427: 5426: 5424: 5422: 5418: 5408: 5405: 5403: 5400: 5398: 5395: 5393: 5390: 5388: 5385: 5384: 5382: 5378: 5371: 5367: 5364: 5362: 5359: 5357: 5354: 5352: 5349: 5347: 5344: 5342: 5339: 5337: 5334: 5333: 5331: 5329: 5323: 5317: 5314: 5312: 5309: 5307: 5304: 5302: 5299: 5297: 5294: 5292: 5289: 5288: 5286: 5284: 5280: 5270: 5267: 5265: 5264:Steganography 5262: 5260: 5257: 5255: 5252: 5250: 5247: 5245: 5244:Interrogation 5242: 5240: 5237: 5235: 5232: 5230: 5229:Eavesdropping 5227: 5225: 5222: 5220: 5216: 5213: 5211: 5208: 5206: 5203: 5201: 5198: 5196: 5193: 5191: 5188: 5184: 5181: 5180: 5179: 5176: 5174: 5171: 5167: 5164: 5162: 5159: 5158: 5157: 5154: 5153: 5151: 5149: 5145: 5139: 5136: 5134: 5133:Direct action 5131: 5129: 5128:Covert action 5126: 5124: 5121: 5119: 5116: 5115: 5113: 5111: 5107: 5099: 5098:organizations 5096: 5095: 5094: 5091: 5090: 5087: 5084: 5082: 5078: 5075: 5073: 5069: 5065: 5058: 5053: 5051: 5046: 5044: 5039: 5038: 5035: 5023: 5020: 5016: 5013: 5011: 5008: 5007: 5006: 5003: 5001: 4998: 4996: 4993: 4991: 4988: 4986: 4983: 4981: 4978: 4976: 4973: 4971: 4968: 4964: 4961: 4959: 4958:interrogation 4956: 4955: 4954: 4951: 4949: 4946: 4944: 4941: 4937: 4934: 4932: 4929: 4928: 4927: 4926:Eavesdropping 4924: 4920: 4917: 4915: 4912: 4911: 4910: 4907: 4905: 4902: 4900: 4897: 4893: 4890: 4889: 4888: 4885: 4884: 4882: 4878: 4872: 4869: 4867: 4864: 4862: 4859: 4858: 4856: 4851: 4847: 4841: 4838: 4834: 4831: 4830: 4829: 4828:Steganography 4826: 4824: 4821: 4819: 4816: 4814: 4811: 4809: 4806: 4804: 4803:Invisible ink 4801: 4799: 4796: 4794: 4791: 4789: 4786: 4784: 4781: 4779: 4776: 4774: 4771: 4769: 4766: 4765: 4763: 4757: 4749: 4746: 4745: 4744: 4741: 4740: 4738: 4734: 4728: 4725: 4723: 4722:Sleeper agent 4720: 4718: 4715: 4713: 4710: 4708: 4705: 4703: 4700: 4696: 4693: 4692: 4691: 4688: 4686: 4685: 4681: 4679: 4676: 4675: 4673: 4668: 4665: 4663: 4660: 4659: 4656: 4652: 4645: 4640: 4638: 4633: 4631: 4626: 4625: 4622: 4616: 4613: 4612: 4603: 4599: 4595: 4592: 4588: 4585: 4581: 4578: 4575: 4574: 4569: 4566: 4562: 4558: 4554: 4550: 4549:covert action 4546: 4545: 4540: 4536: 4532: 4528: 4525: 4521: 4518: 4514: 4512: 4509:Owen, David. 4508: 4505: 4501: 4498: 4494: 4491: 4487: 4484: 4480: 4478: 4474: 4470: 4466: 4462: 4459: 4455: 4451: 4447: 4442: 4438: 4434: 4430: 4426: 4422: 4418: 4414: 4410: 4409: 4404: 4400: 4396: 4395:Henry Farrell 4392: 4391:Krugman, Paul 4389: 4386: 4382: 4379: 4376: 4372: 4369: 4366: 4362: 4359: 4357: 4353: 4350: 4346: 4343: 4339: 4336: 4335: 4330: 4327: 4324: 4320: 4317: 4304: 4303: 4297: 4294: 4290: 4287: 4284: 4280: 4277: 4275: 4271: 4267: 4266: 4255: 4251: 4247: 4243: 4239: 4235: 4231: 4227: 4222: 4218: 4214: 4210: 4206: 4201: 4200: 4188: 4182: 4178: 4171: 4163: 4159: 4155: 4148: 4141: 4135: 4129: 4125: 4122: 4118: 4112: 4104: 4100: 4096: 4090: 4082: 4076: 4072: 4068: 4061: 4053: 4051:9780691006512 4047: 4043: 4039: 4034: 4033: 4024: 4016: 4010: 4006: 3999: 3991: 3989:9781428910676 3985: 3981: 3980: 3973: 3965: 3961: 3955: 3947: 3943: 3939: 3935: 3931: 3927: 3923: 3916: 3908: 3904: 3897: 3889: 3885: 3879: 3865:on 2013-11-01 3864: 3860: 3856: 3850: 3843: 3839: 3835: 3832: 3827: 3821: 3820:John Kiriakou 3815: 3800: 3793: 3778: 3774: 3768: 3760: 3756: 3750: 3744: 3733:on 2012-09-19 3732: 3728: 3724: 3718: 3703: 3697: 3683:on 2011-05-13 3682: 3678: 3672: 3666: 3662: 3659: 3654: 3646: 3642: 3636: 3630: 3626: 3623: 3618: 3604:on 2013-11-02 3603: 3599: 3593: 3586: 3582: 3579: 3574: 3560:on 2019-07-01 3559: 3555: 3549: 3540: 3533: 3527: 3520: 3514: 3503: 3497: 3482: 3478: 3472: 3470: 3468: 3466: 3457: 3453: 3446: 3444: 3442: 3427:on 2009-11-08 3423: 3416: 3412: 3406: 3398: 3392: 3388: 3384: 3378: 3372:, 7 May 2011. 3371: 3368: 3364: 3361: 3355: 3336: 3329: 3322: 3310: 3308:9783733802141 3304: 3300: 3299: 3294: 3293:Ulfkotte, Udo 3288: 3280: 3278:9780241305225 3274: 3270: 3263: 3249: 3245: 3238: 3230: 3226: 3222: 3218: 3214: 3210: 3206: 3202: 3198: 3191: 3183: 3179: 3175: 3171: 3167: 3163: 3159: 3155: 3151: 3144: 3129: 3125: 3119: 3117: 3115: 3107: 3101: 3093: 3089: 3083: 3079: 3064: 3061: 3059: 3056: 3054: 3051: 3049: 3046: 3044: 3041: 3039: 3036: 3034: 3031: 3029: 3028:Foreign agent 3026: 3024: 3021: 3019: 3016: 3014: 3011: 3009: 3006: 3004: 3003:Sleeper agent 3001: 2999: 2996: 2994: 2991: 2989: 2988:Special agent 2986: 2984: 2981: 2979: 2976: 2974: 2971: 2969: 2966: 2964: 2961: 2959: 2956: 2955: 2948: 2946: 2942: 2938: 2934: 2929: 2926: 2921: 2919: 2918: 2917:Spies Like Us 2913: 2912: 2907: 2906: 2901: 2900: 2894: 2892: 2890: 2885: 2884: 2879: 2878: 2877:GoldenEye 007 2873: 2872: 2867: 2862: 2860: 2859: 2853: 2851: 2850:Michael Caine 2848:as played by 2847: 2843: 2842:George Smiley 2839: 2835: 2831: 2830:Johnny Fedora 2827: 2825: 2821: 2817: 2816:Valerie Plame 2813: 2807: 2805: 2801: 2799: 2794: 2790: 2786: 2782: 2778: 2774: 2770: 2769: 2762: 2752: 2750: 2745: 2743: 2739: 2735: 2731: 2727: 2723: 2719: 2715: 2711: 2707: 2703: 2700: 2696: 2691: 2688: 2683: 2679: 2674: 2669: 2667: 2663: 2659: 2655: 2651: 2642: 2638: 2633: 2624: 2620: 2616: 2607: 2605: 2595: 2593: 2589: 2585: 2581: 2575: 2573: 2569: 2565: 2564:John Kiriakou 2561: 2557: 2553: 2549: 2545: 2535: 2533: 2529: 2525: 2521: 2517: 2514: 2510: 2506: 2505:life sentence 2502: 2497: 2495: 2491: 2481: 2479: 2475: 2471: 2467: 2463: 2459: 2455: 2451: 2447: 2442: 2439: 2437: 2433: 2432: 2427: 2423: 2419: 2415: 2411: 2407: 2403: 2399: 2395: 2384: 2381: 2373: 2363: 2359: 2355: 2349: 2347: 2340: 2331: 2330: 2319: 2315: 2312: 2308: 2307:Illegal agent 2305: 2302: 2298: 2294: 2291: 2287: 2284: 2281: 2277: 2276: 2275: 2269: 2266: 2263: 2259: 2255: 2251: 2250:Sleeper agent 2248: 2243: 2239: 2234: 2229: 2226: 2223: 2222: 2220: 2216: 2212: 2209: 2206: 2202: 2198: 2195: 2192: 2188: 2184: 2180: 2176: 2173: 2170: 2169: 2168: 2165: 2163: 2159: 2155: 2154: 2148: 2146: 2135: 2133: 2129: 2123: 2113: 2111: 2106: 2102: 2100: 2096: 2090: 2088: 2082: 2079: 2075: 2070: 2068: 2064: 2059: 2057: 2053: 2048: 2044: 2039: 2037: 2033: 2029: 2025: 2021: 2017: 2016:Special Agent 2013: 2009: 2005: 1996: 1987: 1986: 1979: 1976: 1974: 1971: 1969: 1966: 1964: 1963:Steganography 1961: 1959: 1956: 1954: 1951: 1949: 1946: 1944: 1941: 1939: 1936: 1934: 1931: 1929: 1926: 1924: 1921: 1919: 1918:Interrogation 1916: 1914: 1911: 1909: 1908:Impersonation 1906: 1904: 1901: 1899: 1896: 1893: 1890: 1888: 1885: 1883: 1880: 1878: 1875: 1873: 1870: 1868: 1865: 1863: 1860: 1858: 1855: 1853: 1850: 1849: 1846: 1842: 1832: 1830: 1819: 1816:December 2021 1807: 1802: 1793: 1792: 1789: 1787: 1783: 1779: 1775: 1771: 1767: 1763: 1762: 1755: 1753: 1749: 1745: 1741: 1736: 1733: 1729: 1728:interrogation 1725: 1721: 1717: 1713: 1712:cryptanalysis 1709: 1697: 1693: 1690: 1687: 1684: 1681: 1678: 1675: 1672: 1669: 1668: 1667: 1664: 1655: 1653: 1649: 1645: 1641: 1637: 1633: 1629: 1628:human sources 1624: 1622: 1618: 1608: 1606: 1602: 1598: 1594: 1590: 1586: 1582: 1578: 1574: 1570: 1566: 1562: 1558: 1556: 1552: 1548: 1544: 1540: 1536: 1532: 1528: 1524: 1520: 1516: 1512: 1508: 1504: 1500: 1496: 1491: 1489: 1485: 1481: 1477: 1473: 1469: 1465: 1461: 1456: 1454: 1450: 1446: 1445:Witte Brigade 1442: 1438: 1434: 1430: 1426: 1422: 1418: 1414: 1410: 1406: 1405:U.S. Congress 1402: 1401:United States 1398: 1394: 1386: 1382: 1379:), a Finnish 1378: 1374: 1369: 1365: 1363: 1359: 1355: 1351: 1347: 1342: 1340: 1336: 1328: 1317: 1313: 1312:trade secrets 1309: 1305: 1304:death penalty 1301: 1297: 1293: 1289: 1285: 1281: 1277: 1273: 1269: 1265: 1261: 1257: 1253: 1249: 1245: 1244: 1239: 1238: 1233: 1229: 1224: 1222: 1218: 1214: 1210: 1206: 1205: 1200: 1196: 1192: 1187: 1183: 1173: 1171: 1167: 1163: 1159: 1155: 1150: 1148: 1144: 1140: 1135: 1133: 1129: 1125: 1121: 1117: 1113: 1109: 1105: 1101: 1097: 1093: 1089: 1085: 1074: 1069: 1067: 1062: 1060: 1055: 1054: 1052: 1051: 1046: 1043: 1042: 1041: 1040: 1036: 1035: 1029: 1025: 1021: 1017: 1015: 1012: 1010: 1007: 1005: 1002: 1000: 997: 995: 992: 991: 990: 989: 985: 984: 979: 976: 974: 971: 969: 966: 963: 959: 956: 954: 953:Justification 951: 949: 946: 944: 941: 939: 938: 934: 932: 929: 927: 924: 922: 919: 917: 914: 912: 909: 907: 904: 902: 899: 898: 897: 896: 893: 890: 889: 884: 881: 879: 876: 874: 871: 869: 866: 864: 861: 859: 856: 855: 854: 853: 849: 848: 843: 840: 838: 835: 833: 830: 828: 825: 824: 823: 822: 818: 817: 812: 809: 807: 804: 802: 799: 797: 794: 792: 789: 787: 786:Miscegenation 784: 781: 777: 773: 769: 766: 764: 761: 759: 756: 754: 751: 749: 746: 744: 741: 739: 736: 734: 731: 729: 726: 724: 721: 720: 719: 718: 714: 713: 708: 705: 703: 700: 698: 695: 693: 690: 688: 685: 683: 680: 678: 675: 674: 673: 672: 668: 667: 662: 658: 655: 653: 650: 648: 645: 643: 640: 638: 635: 633: 630: 628: 625: 623: 622:Pickpocketing 620: 618: 615: 613: 610: 608: 605: 603: 600: 598: 595: 593: 590: 588: 585: 583: 580: 578: 575: 573: 570: 568: 565: 563: 560: 558: 555: 553: 550: 548: 545: 543: 540: 539: 538: 537: 533: 532: 527: 524: 522: 519: 517: 514: 512: 509: 507: 504: 502: 499: 497: 494: 492: 489: 487: 484: 482: 479: 477: 474: 472: 471:Homosexuality 469: 467: 464: 462: 459: 457: 454: 452: 449: 447: 444: 443: 442: 441: 438: 435: 434: 429: 426: 424: 421: 419: 416: 414: 411: 409: 406: 402: 399: 398: 397: 394: 390: 387: 386: 385: 382: 380: 377: 374: 370: 367: 365: 362: 360: 357: 355: 352: 350: 347: 345: 342: 340: 337: 335: 334:Home invasion 332: 330: 327: 325: 322: 320: 317: 315: 312: 310: 307: 305: 302: 300: 297: 295: 292: 290: 287: 285: 284:Assassination 282: 281: 280: 279: 276: 273: 272: 267: 264: 262: 259: 257: 254: 252: 249: 248: 247: 246: 243: 240: 239: 233: 229: 226: 223: 220: 217: 213: 210: 209: 208: 207: 203: 202: 197: 194: 192: 189: 187: 184: 182: 179: 177: 174: 172: 169: 168: 167: 166: 163: 159: 158: 153: 150: 148: 145: 143: 142: 138: 136: 135: 131: 130: 129: 128: 125: 122: 121: 118: 115: 114: 110: 106: 105: 102: 94: 91: 83: 80:February 2019 73: 69: 65: 59: 57: 50: 41: 40: 34: 30: 22: 7126:Solicitation 7061:Prostitution 7051:Masturbation 6884:Lèse-majestĂ© 6873:Against the 6668:Embezzlement 6557:Manslaughter 6542:Intimidation 6380:jurisdiction 6377: 6321:Arne Treholt 6296:Ignace Reiss 6238:RyĹ«zĹŤ Sejima 6228:SanzĹŤ Nosaka 6184:Elena Miller 6141:John Vassall 6116:Goronwy Rees 6071:George Blake 6053:Konon Molody 6038:Morris Cohen 5960: 5941:Anna Chapman 5860:Robert Lipka 5850:Karl Koecher 5800:Aldrich Ames 5762:Maria Wicher 5702:Vincent Reno 5697:Lee Pressman 5682:Victor Perlo 5677:William Perl 5667:Boris Morros 5662:Hede Massing 5652:George Koval 5602:Morris Cohen 5582:Earl Browder 5269:Surveillance 5259:Resident spy 5200:Cryptography 5147: 5005:Surveillance 4793:Cyber spying 4778:Cryptography 4717:Resident spy 4702:Double agent 4682: 4650: 4597: 4590: 4583: 4571: 4542: 4538: 4535:CĂ©cile Fabre 4530: 4523: 4516: 4510: 4503: 4496: 4489: 4482: 4468: 4450:Meng Wanzhou 4406: 4402: 4384: 4374: 4371:Keegan, John 4364: 4348: 4341: 4332: 4329:Gopnik, Adam 4322: 4315: 4309:September 2, 4307:. Retrieved 4301: 4292: 4282: 4269: 4229: 4225: 4204: 4176: 4170: 4162:the original 4157: 4147: 4139: 4134: 4116: 4111: 4103:the original 4098: 4089: 4066: 4060: 4031: 4023: 4004: 3998: 3978: 3972: 3954: 3929: 3925: 3921: 3915: 3902: 3896: 3878: 3867:. Retrieved 3863:the original 3858: 3849: 3826: 3814: 3803:. Retrieved 3792: 3780:. Retrieved 3776: 3767: 3759:the original 3749: 3742: 3735:. Retrieved 3731:the original 3726: 3717: 3706:. Retrieved 3696: 3685:. Retrieved 3681:the original 3671: 3653: 3645:the original 3635: 3617: 3606:. Retrieved 3602:the original 3592: 3573: 3562:. Retrieved 3558:the original 3548: 3539: 3526: 3513: 3496: 3484:. Retrieved 3480: 3451: 3429:. Retrieved 3422:the original 3405: 3386: 3377: 3369: 3354: 3344:September 3, 3342:. Retrieved 3328: 3319: 3312:. Retrieved 3297: 3287: 3268: 3262: 3251:. Retrieved 3247: 3237: 3204: 3200: 3190: 3157: 3153: 3143: 3131:. Retrieved 3127: 3105: 3100: 3082: 2941:S.H.I.E.L.D. 2930: 2924: 2922: 2915: 2909: 2903: 2897: 2895: 2888: 2881: 2875: 2871:Perfect Dark 2869: 2863: 2858:The Baroness 2856: 2854: 2846:Harry Palmer 2828: 2808: 2796: 2789:Central Asia 2779:between the 2766: 2764: 2746: 2710:World War II 2704: 2692: 2670: 2646: 2621: 2617: 2613: 2601: 2576: 2552:World War II 2541: 2524:Soviet Union 2498: 2494:Josef Jakobs 2490:World War II 2487: 2443: 2440: 2429: 2418:Eastern Bloc 2410:Aldrich Ames 2391: 2376: 2367: 2343: 2289: 2273: 2268:Triple agent 2261: 2257: 2253: 2241: 2237: 2233:double agent 2232: 2211:Double agent 2201:publications 2190: 2182: 2166: 2162:case officer 2161: 2157: 2151: 2149: 2141: 2125: 2107: 2103: 2101:and others. 2091: 2083: 2077: 2073: 2071: 2060: 2051: 2040: 2012:case officer 2001: 1990:Organization 1984: 1983: 1968:Surveillance 1882:Cyber spying 1867:Covert agent 1826: 1813: 1805: 1759: 1756: 1737: 1705: 1665: 1661: 1625: 1614: 1559: 1492: 1476:Soviet Union 1460:World War II 1457: 1417:World War II 1397:great powers 1390: 1384: 1376: 1343: 1339:police-state 1335:Daniel Defoe 1318:of England ( 1256:inquisitions 1243:Arthashastra 1241: 1235: 1225: 1202: 1188: 1185: 1154:enemy forces 1151: 1145:is known as 1143:corporations 1136: 1107: 1103: 1100:intelligence 1091: 1087: 1083: 1082: 978:Self-defense 935: 867: 858:Lèse-majestĂ© 572:Embezzlement 496:Prostitution 486:Masturbation 369:Manslaughter 354:Intimidation 266:Solicitation 139: 132: 117:Criminal law 101: 86: 77: 53: 7031:Fornication 6948:Obstruction 6928:Compounding 6738:Tax evasion 6487:Child abuse 6401:Misdemeanor 6306:Herman Simm 6291:Alfred Redl 6247:Elsewhere / 6146:Arthur Wynn 6086:Klaus Fuchs 6076:David Crook 6000:Guy Burgess 5929:Post-Soviet 5820:Jack Dunlap 5795:Rudolf Abel 5767:Nathan Witt 5742:Harold Ware 5717:Saville Sax 5647:Donald Hiss 5617:Klaus Fuchs 5587:Boris Bukov 5341:Geophysical 5123:Cell system 5110:Clandestine 4995:Stay-behind 4904:Recruitment 4861:Canary trap 4759:Devices and 4707:Field agent 4567:." (p. 34.) 4425:computation 4361:Kahn, David 4197:Works cited 3641:"espionage" 3389:. Berkley. 3160:(1): 1–18. 3088:"Espionage" 2820:existential 2761:Spy fiction 2755:Spy fiction 2678:belligerent 2662:prosecution 2446:World War I 2370:August 2024 2219:fabricators 2126:Reportedly 1774:§§ 792 1748:Oslo Report 1581:Vietnam War 1555:Rudolf Abel 1535:Guy Burgess 1468:former USSR 1407:passed the 1399:except the 1393:World War I 1350:Nathan Hale 1344:During the 1316:Elizabeth I 1272:ambassadors 1268:city-states 1248:Middle Ages 1240:and in the 1230:as well as 1124:clandestine 973:Provocation 697:Obstruction 677:Compounding 642:Tax evasion 466:Fornication 299:Child abuse 228:Misdemeanor 152:Concurrence 7168:Categories 7139:WikiSource 7121:Incitement 7116:Conspiracy 6991:Bestiality 6943:Misprision 6907:Subversion 6863:War crimes 6858:Usurpation 6785:Corruption 6663:Cybercrime 6547:Kidnapping 6527:Hate crime 6517:Harassment 6497:Defamation 6451:Law portal 6426:Corruption 6416:Indictable 6396:Infraction 6033:Lona Cohen 6015:Kim Philby 5890:Myra Soble 5885:Jack Soble 5627:Harry Gold 5612:Noel Field 5597:Lona Cohen 5370:earthquake 5234:False flag 5072:Collection 4990:Sexpionage 4970:COINTELPRO 4963:safe house 4943:False flag 4880:Operations 4854:techniques 4850:Tradecraft 4454:bank fraud 4207:. London: 4040:. p.  3869:2013-08-16 3805:2011-03-19 3737:2014-01-03 3708:2011-03-19 3687:2011-03-19 3608:2013-08-17 3564:2010-05-14 3431:2007-10-01 3253:2023-12-21 3248:HistoryNet 3070:References 2889:Metal Gear 2886:, and the 2866:video game 2838:James Bond 2777:Great Game 2650:combatants 2406:Rosenbergs 2394:legal code 2145:false flag 2056:tradecraft 2036:safe house 1948:Safe house 1894:operations 1892:False flag 1841:Tradecraft 1839:See also: 1744:subterfuge 1621:terrorists 1611:Modern day 1499:Alger Hiss 1387:) in 1930s 1252:subversion 1211:, and the 1158:dissidents 1112:government 931:Entrapment 906:Automatism 883:Subversion 842:Bestiality 811:War crimes 806:Usurpation 733:Corruption 692:Misprision 567:Cybercrime 359:Kidnapping 339:Hate crime 329:Harassment 309:Defamation 261:Incitement 256:Conspiracy 222:Infraction 181:Complicity 176:Accomplice 134:Actus reus 7174:Espionage 7149:Wikiquote 7091:Voyeurism 7071:Pederasty 7056:Obscenity 6897:Secession 6893:Espionage 6853:Terrorism 6815:Smuggling 6753:Vandalism 6733:Smuggling 6673:Extortion 6648:Blackmail 6561:corporate 6367:Types of 6199:Fred Rose 6106:John Peet 6043:Ethel Gee 5687:J. Peters 5572:Joel Barr 5552:In the US 5361:Materials 5215:Defection 5210:Dead drop 5183:black bag 5148:Espionage 4914:black bag 4798:Dead drop 4727:Spymaster 4651:Espionage 4254:201749182 4246:1543-7795 3946:156655154 3932:(2): 41. 3704:. fas.org 3314:6 January 3229:220652440 3174:0017-3835 3075:Citations 2983:Detective 2899:Get Smart 2706:Saboteurs 2666:execution 2654:disguises 2580:stateless 2358:talk page 2262:activated 2244:is blown. 2063:defectors 1887:Dead drop 1758:nation". 1543:Otto John 1453:Home Army 1413:Mata Hari 1381:socialite 1341:methods. 1246:. In the 1084:Espionage 994:Contracts 968:Necessity 873:Secession 868:Espionage 801:Terrorism 763:Smuggling 657:Vandalism 637:Smuggling 577:Extortion 552:Blackmail 526:Voyeurism 506:Pederasty 491:Obscenity 373:corporate 196:Vicarious 191:Principal 186:Corporate 171:Accessory 162:liability 147:Causation 68:talk page 7189:Security 7154:Wikinews 7011:Adultery 6981:Poaching 6917:Against 6902:Sedition 6848:Regicide 6800:Genocide 6775:Apostasy 6757:Mischief 6693:Gambling 6658:Burglary 6629:property 6627:Against 6611:Stabbing 6606:Stalking 6589:Homicide 6552:Menacing 6532:Homicide 6169:Sam Carr 5787:Cold War 5567:John Abt 5421:Analysis 5219:Turncoat 5166:handling 4980:SHAMROCK 4833:microdot 4736:Analysis 4305:. US CIA 4217:52130886 4124:Archived 3834:Archived 3661:Archived 3625:Archived 3581:Archived 3385:(1987). 3363:Archived 3321:empfahl. 3295:(1997). 3221:26098615 2951:See also 2945:Avengers 2937:Iron Man 2558:such as 2522:for the 2352:You may 2215:Peddlers 2087:sabotage 2085:such as 2032:couriers 1958:Spy ship 1943:Sabotage 1913:Impostor 1903:Honeypot 1565:Mongolia 1495:Cold War 1464:Cold War 1296:archives 1288:security 1162:sabotage 1139:military 1009:Property 1004:Evidence 999:Defenses 948:Insanity 878:Sedition 832:Poaching 796:Regicide 748:Genocide 723:Apostasy 661:Mischief 597:Gambling 562:Burglary 446:Adultery 423:Stabbing 418:Stalking 401:Homicide 364:Menacing 344:Homicide 141:Mens rea 124:Elements 62:You may 7111:Attempt 6953:Perjury 6919:justice 6889:Treason 6832:smoking 6828:alcohol 6795:Dueling 6780:Begging 6728:Robbery 6708:Looting 6703:Larceny 6683:Forgery 6653:Bribery 6616:Torture 6601:Robbery 6559: ( 6512:Frameup 6482:Battery 6477:Assault 6411:Summary 6389:Classes 5976:In the 5368: ( 5346:Nuclear 5316:TEMPEST 4975:MINARET 4919:wetwork 4557:Soviets 4506:(1992). 4492:(1984). 4433:nuclear 4377:, 2003. 4295:, 1944. 4285:, 2018. 4274:excerpt 4119:(2008) 3727:Bop.gov 3622:treason 3578:Illegal 3543:Cia.gov 3486:12 July 3133:12 July 2933:Russian 2798:The Spy 2687:treason 2402:treason 2318:handler 2301:staging 2297:garages 2254:wake up 2205:mislead 2047:treason 2022:(i.e., 1985:Source: 1877:Cut-out 1806:updated 1529:of the 1493:In the 1482:to the 1480:Okhrana 1421:Germany 1371:Madame 1176:History 1132:illegal 1116:company 1037:Portals 1028:estates 960: ( 958:Mistake 943:Infancy 911:Consent 863:Treason 780:smoking 776:alcohol 743:Dueling 728:Begging 702:Perjury 632:Robbery 612:Looting 607:Larceny 587:Forgery 557:Bribery 428:Torture 413:Robbery 371: ( 324:Frameup 294:Battery 289:Assault 251:Attempt 7041:Incest 7016:Bigamy 6843:Piracy 6830:, and 6713:Payola 6577:felony 6572:Murder 6567:Mayhem 6421:Hybrid 6406:Felony 6161:Canada 5205:Cutout 5156:Agents 5010:Global 4936:MASINT 4931:SIGINT 4783:Cutout 4667:Assets 4662:Agents 4593:(2014) 4576:(2003) 4565:Poland 4519:(1977) 4475:  4437:Huawei 4417:prisms 4354:  4252:  4244:  4215:  4183:  4121:online 4077:  4048:  4011:  3986:  3944:  3782:5 June 3658:spying 3393:  3305:  3275:  3227:  3219:  3182:643204 3180:  3172:  2908:, and 2891:series 2844:, and 2836:, but 2785:Russia 2695:airmen 2643:, 1880 2566:, and 2528:Russia 2520:spying 2290:target 2132:German 2128:Canada 2078:is not 2074:legend 2052:legend 1772:  1716:COMINT 1708:HUMINT 1646:) and 1636:SIGINT 1569:Russia 1470:. The 1449:Milorg 1443:, the 1395:, all 1280:Venice 1260:heresy 1207:, the 1088:spying 1024:trusts 962:of law 926:Duress 791:Piracy 778:, and 617:Payola 476:Incest 451:Bigamy 389:felony 384:Murder 379:Mayhem 212:Felony 6875:state 6824:drugs 6743:Theft 6688:Fraud 6638:Arson 6369:crime 6210:Japan 5380:Other 5351:Radar 5195:Cover 5173:Asset 5161:field 4695:Agent 4690:Cover 4250:S2CID 3942:S2CID 3505:(PDF) 3425:(PDF) 3418:(PDF) 3338:(PDF) 3225:S2CID 3217:JSTOR 3178:JSTOR 2652:wear 2360:, or 2242:cover 2189:. In 2160:, or 2008:asset 1724:OSINT 1720:IMINT 1696:moles 1640:IMINT 1630:over 1597:SAVAK 1593:Syria 1585:Libya 1573:India 1561:China 1437:Maier 1377:right 1232:peace 1209:Bible 1204:Iliad 1090:, or 1020:Wills 1014:Torts 772:drugs 647:Theft 592:Fraud 542:Arson 70:, or 7066:Rape 5015:Mass 4985:FVEY 4712:Mole 4499:1991 4473:ISBN 4461:HSBC 4429:Iran 4397:and 4352:ISBN 4325:2005 4311:2012 4242:ISSN 4213:OCLC 4209:HMSO 4181:ISBN 4075:ISBN 4046:ISBN 4009:ISBN 3984:ISBN 3784:2023 3488:2021 3391:ISBN 3346:2021 3316:2023 3303:ISBN 3273:ISBN 3170:ISSN 3135:2021 2783:and 2671:The 2586:and 2526:and 1843:and 1638:and 1619:and 1591:and 1589:Iran 1571:and 1549:and 1537:and 1423:and 1385:left 1352:and 1292:doge 1026:and 501:Rape 230:(or 214:(or 31:and 6208:In 6159:In 4852:and 4563:in 4234:doi 4042:106 3934:doi 3924:". 3209:doi 3162:doi 3092:MI5 2958:MI5 2768:Kim 2724:in 2718:FBI 2697:as 2639:by 2627:War 2550:in 2513:CIA 2325:Law 2238:may 2054:in 2026:or 2014:or 2006:, " 1778:798 1714:or 1652:GRU 1644:KGB 1531:GRU 1484:KGB 1325:), 1274:in 1228:war 1108:spy 1106:or 1045:Law 7170:: 6826:, 6755:, 5978:UK 5217:/ 4582:, 4537:, 4448:, 4441:5G 4401:, 4383:, 4373:, 4363:, 4291:, 4281:, 4248:. 4240:. 4230:73 4228:. 4211:. 4156:. 4097:. 4069:. 4044:. 4036:. 3962:. 3940:. 3928:. 3905:. 3886:. 3857:. 3775:. 3725:. 3479:. 3464:^ 3454:. 3440:^ 3370:AP 3318:. 3246:. 3223:. 3215:. 3205:21 3203:. 3199:. 3176:. 3168:. 3158:45 3156:. 3152:. 3126:. 3113:^ 3090:. 2947:. 2893:. 2880:, 2874:, 2852:. 2806:. 2781:UK 2744:. 2668:. 2594:. 2574:. 2562:, 2476:, 2472:, 2468:, 2464:, 2460:, 2456:, 2452:, 2217:, 2156:, 2097:, 2089:. 2072:A 1831:. 1607:. 1587:, 1567:, 1521:, 1517:, 1509:, 1501:, 1447:, 1419:, 1411:. 1348:, 1331:c. 1321:r. 1223:. 1149:. 1118:, 1114:, 1086:, 1022:, 774:, 659:, 6834:) 6563:) 6360:e 6353:t 6346:v 5538:e 5531:t 5524:v 5372:) 5056:e 5049:t 5042:v 4643:e 4636:t 4629:v 4313:. 4256:. 4236:: 4219:. 4189:. 4083:. 4054:. 4017:. 3992:. 3966:. 3948:. 3936:: 3930:6 3890:. 3872:. 3844:) 3808:. 3786:. 3740:. 3711:. 3690:. 3611:. 3567:. 3530:" 3517:" 3507:. 3490:. 3434:. 3399:. 3348:. 3281:. 3256:. 3211:: 3184:. 3164:: 3137:. 3094:. 2800:, 2383:) 2377:( 2372:) 2368:( 2350:. 2264:. 1818:) 1814:( 1788:. 1776:– 1650:( 1375:( 1329:( 1098:( 1072:e 1065:t 1058:v 964:) 782:) 375:) 234:) 218:) 93:) 87:( 82:) 78:( 60:. 35:. 23:.

Index

Espionage (disambiguation)
Spy (disambiguation)
Secret agent (disambiguation)
worldwide view
improve this article
talk page
create a new article
Learn how and when to remove this message

Criminal law
Elements
Actus reus
Mens rea
Causation
Concurrence
liability
Accessory
Accomplice
Complicity
Corporate
Principal
Vicarious
Felony
Indictable offense
Infraction
Misdemeanor
Summary offense
Inchoate offenses
Attempt
Conspiracy

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑