4411:, vol. 103, no. 1 (January/February 2024), pp. 150–156. "The dollar is one of the few currencies that almost all major banks will accept, and... the most widely used... As a result, the dollar is the currency that many companies must use... to do international business." (p. 150.) "ocal banks facilitating that trade... normally... buy U.S. dollars and then use dollars to buy . To do so, however, the banks must have access to the U.S. financial system and... follow rules laid out by Washington." (pp. 151–152.) "But there is another, lesser-known reason why the commands overwhelming economic power. Most of the world's
4337:, 2 September 2019, pp. 53–59. "There seems to be a paranoid paradox of espionage: the better your intelligence, the dumber your conduct; the more you know, the less you anticipate.... Hard-won information is ignored or wildly misinterpreted.... happens again and again a seeming national advance in intelligence is squandered through cross-bred confusion, political rivalry, mutual bureaucratic suspicions, intergovernmental competition, and fear of the press (as well as leaks to the press), all seasoned with dashes of sexual jealousy and adulterous intrigue." (p. 54.)
2632:
1490:(CIA) to coordinate intelligence and the National Security Agency for research into codes and electronic communication. In addition to these, the United States has 13 other intelligence gathering agencies; most of the U.S. expenditures for intelligence gathering are budgeted to various Defense Dept. agencies and their programs. Under the intelligence reorganization of 2004, the director of national intelligence is responsible for overseeing and coordinating the activities and budgets of the U.S. intelligence agencies.
1995:
1797:
6436:
2335:
45:
4464:
154–155.) Farrell and Newman, writes
Krugman, "are worried about the possibility of overreach. f the weaponizes the dollar against too many countries, they might... band together and adopt alternative methods of international payment. If countries become deeply worried about U.S. spying, they could lay fiber-optic cables that bypass the . And if Washington puts too many restrictions on American exports, foreign firms might turn away from U.S. technology." (p. 155.)
6445:
1368:
109:
2751:. This provides a mandatory death sentence if a person captured in the act is proven to be "lurking as a spy or acting as a spy in or about any place, vessel, or aircraft, within the control or jurisdiction of any of the armed forces, or in or about any shipyard, any manufacturing or industrial plant, or any other place or institution engaged in work in aid of the prosecution of the war by the United States, or elsewhere".
2582:. The BBC reported in 2012 on one such case, that of Mohammed Idrees, who was held under Indian police control for approximately 13 years for overstaying his 15-day visa by 2–3 days after seeing his ill parents in 1999. Much of the 13 years were spent in prison waiting for a hearing, and more time was spent homeless or living with generous families. The Indian
2213:: engages in clandestine activity for two intelligence or security services (or more in joint operations), who provides information about one or about each to the other, and who wittingly withholds significant information from one on the instructions of the other or is unwittingly manipulated by one so that significant facts are withheld from the adversary.
2615:
legally as "information of all sorts gathered by a government or organisation to guide its decisions. It includes information that may be both public and private, obtained from much different public or secret sources. It could consist entirely of information from either publicly available or secret sources, or be a combination of the two."
4614:
4443:
equipment to much of the planet giv China the power to eavesdrop on the rest of the world – just as the has done.... The learned that Huawei had been dealing surreptitiously with Iran – and therefore violating U.S. sanctions. Then, it... used its special access to information on international bank
2622:
There are also laws surrounding government and organisational intelligence and surveillance. Generally, the body involved should be issued with some form of warrant or permission from the government and should be enacting their procedures in the interest of protecting national security or the safety
2235:
usually has knowledge of both intelligence services and can identify operational techniques of both, thus making third-party recruitment difficult or impossible. The knowledge of operational techniques can also affect the relationship between the operations officer (or case officer) and the agent if
2104:
Many organizations, both national and non-national, conduct espionage operations. It should not be assumed that espionage is always directed at the most secret operations of a target country. National and terrorist organizations and other groups are also targeted. This is because governments want to
2221:, and others who work for themselves rather than a service are not double agents because they are not agents. The fact that double agents have an agent relationship with both sides distinguishes them from penetrations, who normally are placed with the target service in a staff or officer capacity."
2080:
an illegal agent, but is an ordinary citizen who is "relocated", for example, a "protected witness". Nevertheless, such a non-agent very likely will also have a case officer who will act as a controller. As in most, if not all synthetic identity schemes, for whatever purpose (illegal or legal), the
1757:
The US defines espionage towards itself as "the act of obtaining, delivering, transmitting, communicating, or receiving information about the national defence with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign
2702:
military operations while so disguised. Soldiers who are wearing enemy uniforms or civilian clothes simply for the sake of warmth along with other purposes rather than engaging in espionage or similar military operations while so attired are also excluded from being treated as unlawful combatants.
2618:
However, espionage and intelligence can be linked. According to the MI5 website, "foreign intelligence officers acting in the UK under diplomatic cover may enjoy immunity from prosecution. Such persons can only be tried for spying (or, indeed, any criminal offence) if diplomatic immunity is waived
2614:
Government intelligence is very much distinct from espionage, and is not illegal in the UK, providing that the organisations of individuals are registered, often with the ICO, and are acting within the restrictions of the
Regulation of Investigatory Powers Act (RIPA). 'Intelligence' is considered
2577:
As of 2012, India and
Pakistan were holding several hundred prisoners of each other's country for minor violations like trespass or visa overstay, often with accusations of espionage attached. Some of these include cases where Pakistan and India both deny citizenship to these people, leaving them
2084:
Spies may also be used to spread disinformation in the organization in which they are planted, such as giving false reports about their country's military movements, or about a competing company's ability to bring a product to market. Spies may be given other roles that also require infiltration,
4463:
that her company was not doing business with Iran. Canadian authorities, acting on a U.S. request, arrested her... in
December 2018. After... almost three years under house arrest... Meng... was allowed to return to China... But by the prospects for Chinese dominance of 5G had vanished..." (pp.
2675:
addresses the status of wartime spies, specifically within "Laws and
Customs of War on Land" (Hague IV); October 18, 1907: CHAPTER II Spies". Article 29 states that a person is considered a spy who, acts clandestinely or on false pretences, infiltrates enemy lines with the intention of acquiring
2230:
Unwitting double agent: offers or is forced to recruit as a double or redoubled agent and in the process is recruited by either a third-party intelligence service or his own government without the knowledge of the intended target intelligence service or the agent. This can be useful in capturing
2701:
distinguishes between a disguised spy and a disguised escaper. It is permissible for these groups to wear enemy uniforms or civilian clothes in order to facilitate their escape back to friendly lines so long as they do not attack enemy forces, collect military intelligence, or engage in similar
2684:
entitled to be treated as prisoners of war upon capture by the enemy. Article 30 states that a spy captured behind enemy lines may only be punished following a trial. However, Article 31 provides that if a spy successfully rejoined his own military and is then captured by the enemy as a lawful
2045:. Often the players have never met. Case officers are stationed in foreign countries to recruit and supervise intelligence agents, who in turn spy on targets in the countries where they are assigned. A spy need not be a citizen of the target country and hence does not automatically commit
2623:
of public citizens. Those carrying out intelligence missions should act within not only RIPA but also the Data
Protection Act and Human Rights Act. However, there are spy equipment laws and legal requirements around intelligence methods that vary for each form of intelligence enacted.
1662:
Espionage agents are usually trained experts in a targeted field so they can differentiate mundane information from targets of value to their own organizational development. Correct identification of the target at its execution is the sole purpose of the espionage operation.
3722:
2193:, "Economic Analysts may use their specialized skills to analyze and interpret economic trends and developments, assess and track foreign financial activities, and develop new econometric and modelling methodologies." This may also include information of trade or tariff.
2927:
highlights the adventurous life of U.S. Colonel Sidney
Forrester Mashbir, who during the 1920s and 1930s attempted to prevent war with Japan, and when war did erupt, he became General MacArthur's top advisor in the Pacific Theater of World War Two.
2606:, which repealed prior Official Secrets Acts and creates three separate offences for espionage. A person is liable to be imprisoned for life for committing an offence under Section 1 of the Act, or 14 years for an offence under Sections 2 and 3
2814:, a natural consequence of the secrecy inherent in their work. To fill in the blanks, the popular conception of the secret agent has been formed largely by 20th and 21st-century fiction and film. Attractive and sociable real-life agents such as
2112:, and also a great vulnerability when the adversary has sophisticated SIGINT detection and interception capability. Spies rely on COVCOM or covert communication through technically advanced spy devices. Agents must also transfer money securely.
2809:
During the many 20th-century spy scandals, much information became publicly known about national spy agencies and dozens of real-life secret agents. These sensational stories piqued public interest in a profession largely off-limits to
3730:
3320:
Ein neuer Typ des Spions War Daniel Defoe (1650-1731), der Autor des weltberĂĽhmten Romans "Robinson Crusoe" ... Zudem verfaĂźte Defoe eine
Theorie der Spionage, in der er der Regierung die Spitzelmethoden des Polizeistaates
2049:
when operating within it. While the more common practice is to recruit a person already trusted with access to sensitive information, sometimes a person with a well-prepared synthetic identity (cover background), called a
1734:
patrols and from diplomats, etc., are not considered espionage. Espionage is the disclosure of sensitive information (classified) to people who are not cleared for that information or access to that sensitive information.
2092:
Many governments spy on their allies as well as their enemies, although they typically maintain a policy of not commenting on this. Governments also employ private companies to collect information on their behalf such as
2689:
against their own country or co-belligerents of that country and may be captured and prosecuted at any place or any time regardless whether he rejoined the military to which he belongs or not or during or after the war.
2647:
In war, espionage is considered permissible as many nations recognize the inevitability of opposing sides seeking intelligence each about the dispositions of the other. To make the mission easier and successful,
1688:
intelligence (offensive, defensive, manoeuvre, naval, air, space). Agents are trained by military espionage education facilities and posted to an area of operation with covert identities to minimize prosecution
1682:
Strategic economic strengths (production, research, manufacture, infrastructure). Agents recruited from science and technology academia, commercial enterprises, and more rarely from among military technologists
2142:
In espionage jargon, an "agent" is the person who does the spying. They may be a citizen of a country recruited by that country to spy on another; a citizen of a country recruited by that country to carry out
2546:(at that time the Act had much stricter guidelines and amongst other things banned speech against military recruiting). The law was later used to suppress publication of periodicals, for example of
3660:
2400:. The risks of espionage vary. A spy violating the host country's laws may be deported, imprisoned, or even executed. A spy violating its own country's laws can be imprisoned for espionage or/and
2708:
are treated as spies as they too wear disguises behind enemy lines for the purpose of waging destruction on an enemy's vital targets in addition to intelligence gathering. For example, during
1706:
Although the news media may speak of "spy satellites" and the like, espionage is not a synonym for all intelligence-gathering disciplines. It is a specific form of human source intelligence (
2656:
to conceal their true identity from the enemy while penetrating enemy lines for intelligence gathering. However, if they are caught behind enemy lines in disguises, they are not entitled to
1137:
Espionage is often part of an institutional effort by a government or commercial concern. However, the term tends to be associated with state spying on potential or actual enemies for
3553:
1679:
towards domestic and foreign policies (popular, middle class, elites). Agents often recruited from field journalistic crews, exchange postgraduate students and sociology researchers
2404:(which in the United States and some other jurisdictions can only occur if they take up arms or aids the enemy against their own country during wartime), or even executed, as the
1742:, espionage usually involves accessing the place where the desired information is stored or accessing the people who know the information and will divulge it through some kind of
1673:: strategic production identification and assessment (food, energy, materials). Agents are usually found among bureaucrats who administer these resources in their own countries
2822:
hero operating outside the everyday constraints of society. Loner spy personalities may have been a stereotype of convenience for authors who already knew how to write loner
2147:
assignments disrupting his own country; a citizen of one country who is recruited by a second country to spy on or work against his own country or a third country, and more.
3640:
3624:
3062:
4123:
3884:"Convention (IV) respecting the Laws and Customs of War on Land and its annex: Regulations concerning the Laws and Customs of War on Land. The Hague, 18 October 1907"
3597:
2685:
combatant, he cannot be punished for his previous acts of espionage and must be treated as a prisoner of war. This provision does not apply to citizens who committed
1403:
had elaborate civilian espionage systems and all national military establishments had intelligence units. In order to protect the country against foreign agents, the
1152:
One way to gather data and information about a targeted organization is by infiltrating its ranks. Spies can then return information such as the size and strength of
5290:
1553:, U.S. cryptographers, in 1960, and Harold (Kim) Philby of Great Britain in 1962. U.S. acknowledgment of its U-2 flights and the exchange of Francis Gary Powers for
5503:
3452:
New Rules for
Victims of Armed Conflicts: Commentary on the Two 1977 Protocols Additional to the Geneva Conventions of 1949 (Nijhoff Classics in International Law)
5054:
2840:
is the most commercially successful of the many spy characters created by intelligence insiders during that struggle. Other fictional agents include Le Carré's
2313:
and does not report to a local station. A nonofficial cover operative can be dubbed an "illegal" when working in another country without diplomatic protection.
2236:
the case is transferred by an operational targeting officer] to a new operations officer, leaving the new officer vulnerable to attack. This type of transfer
2434:
and taken to the airport. Ames' wife was threatened with life imprisonment if her husband did not cooperate; he did, and she was given a five-year sentence.
1513:
over the Soviet Union for the CIA, was shot down and captured. During the Cold War, many Soviet intelligence officials defected to the West, including Gen.
5300:
3977:
2438:, a CIA officer in China, spent nineteen years in a Chinese prison for espionage—and died there—as he was operating without diplomatic cover and immunity.
3657:
2720:
thanks to two German agents betraying the mission to the U.S. Under the Hague
Convention of 1907, these Germans were classified as spies and tried by a
1172:
have strict laws concerning espionage, including those who practice espionage in other countries, and the penalties for being caught are often severe.
3854:
3362:
2680:
during times of war. Soldiers who penetrate enemy lines in proper uniforms for the purpose of acquiring intelligence are not considered spies but are
1694:
operations targeting opponent's intelligence services themselves, such as breaching the confidentiality of communications and recruiting defectors or
4153:
3501:
4427:
to analyze the data. As a result, the can monitor almost all international communication." (p. 154) This has allowed the U.S. "to effectively cut
3833:
2420:
to his KGB-officer "handler", the KGB "rolled up" several networks, and at least ten people were secretly shot. When Ames was arrested by the U.S.
4572:
3754:
3531:
1298:
freely. In 1481 the Council of Ten barred all Venetian government officials from making contact with ambassadors or foreigners. Those revealing
4415:, which carry data and messages around the planet, travel through the United States." (p. 152.) "he U.S. government has installed 'splitters':
2345:
55:
1998:
An intelligence officer's clothing, accessories, and behavior must be as unremarkable as possible—their lives (and others') may depend on it.
3557:
1486:(Committee for State Security), which also acted as a secret police force. In the United States, the 1947 National Security Act created the
5433:
5097:
4419:
that divide the beams of light carrying information into two streams. One... goes on to the intended recipients, ... the other goes to the
3104:
Fischbacher-Smith, D., 2011. "The enemy has passed through the gate: Insider threats, the dark triad, and the challenges around security".
2542:
Espionage laws are also used to prosecute non-spies. In the United States, the Espionage Act of 1917 was used against socialist politician
3960:"United States of America, Practice Relating to Rule 62. Improper Use of Flags or Military Emblems, Insignia or Uniforms of the Adversary"
5080:
5047:
4952:
3883:
3042:
2780:
2256:
and perform a specific set of tasks or functions while living undercover in an area of interest. This type of agent is not the same as a
1707:
1627:
4094:
3052:
1844:
1739:
1160:
within the organization and influence them to provide further information or to defect. In times of crisis, spies steal technology and
5496:
5137:
3580:
2741:
1626:
Intelligence services value certain intelligence collection techniques over others. The former Soviet Union, for example, preferred
6358:
3963:
3887:
2855:
Jumping on the spy bandwagon, other writers also started writing about spy fiction featuring female spies as protagonists, such as
3414:
2441:
In United States law, treason, espionage, and spying are separate crimes. Treason and espionage have graduated punishment levels.
2306:
3920:
Charlesworth, Lorie (2006). "2 SAS Regiment, War Crimes Investigations, and British Intelligence: Intelligence Officials and the
1726:) are all intelligence gathering disciplines, but none of them is considered espionage. Many HUMINT activities, such as prisoner
1455:
worked against Nazi Germany and provided the Allied secret services with information that was very important for the war effort.
1415:, who obtained information for Germany by seducing French officials, was the most noted espionage agent of World War I. Prior to
5536:
5325:
5295:
5040:
4935:
4891:
3644:
3017:
1070:
3621:
5551:
5478:
4476:
4355:
4184:
4078:
4012:
3394:
2583:
2508:
4120:
3518:
2260:, who continually contacts a case officer to file intelligence reports. A sleeper agent is not in contact with anyone until
7178:
5127:
4886:
3601:
2003:
2818:
find little employment in serious fiction, however. The fictional secret agent is more often a loner, sometimes amoral—an
2134:
companies are estimated to be losing about €50 billion ($ 87 billion) and 30,000 jobs to industrial espionage every year.
4641:
4394:
4300:
2882:
2732:
at the District of Columbia jail. Two who had given evidence against the others had their sentences reduced by President
2693:
The ones that are excluded from being treated as spies while behind enemy lines are escaping prisoners of war and downed
2499:
In modern times, many people convicted of espionage have been given penal sentences rather than execution. For example,
1563:
has a very cost-effective intelligence program that is especially effective in monitoring neighboring countries such as
5071:
2488:
From ancient times, the penalty for espionage in many countries was execution. This was true right up until the era of
2098:
1769:
1715:
1435:. However, the British system was the keystone of Allied intelligence. Numerous resistance groups such as the Austrian
4787:
4497:
Honorable Treachery: A History of U.S. Intelligence, Espionage, Covert Action from the American Revolution to the CIA
4049:
3987:
3306:
3276:
2379:
1337:(died 1731) not only spied for the British government, but also developed a theory of espionage foreshadowing modern
89:
3476:
2105:
retrieve information that they can use to be proactive in protecting their nation from potential terrorist attacks.
7035:
6957:
5428:
5420:
4822:
4747:
4420:
2748:
1781:
706:
470:
2716:, a sabotage mission against U.S. economic targets. Two weeks later, all were arrested in civilian clothes by the
2288:: provides misleading information to an enemy intelligence service or attempts to discredit the operations of the
2174:: instigates trouble or provides information to gather as many people as possible into one location for an arrest.
7183:
5438:
4560:
2962:
2904:
2876:
2421:
6120:
5369:
5194:
5109:
4689:
4435:
programs in exchange for relief." (pp. 153–154.) " few years ago, American officials... were in a panic about
4278:
2977:
2765:
Spies have long been favorite topics for novelists and filmmakers. An early example of espionage literature is
942:
195:
3123:
1764:(1990) defines espionage as: "... gathering, transmitting, or losing ... information related to the
5063:
3702:"USA v. Robert Philip Hanssen: Affidavit in Support of Criminal Complaint, Arrest Warrant and Search Warrant"
3047:
2728:
On August 3, 1942, all eight were found guilty and sentenced to death. Five days later, six were executed by
952:
32:
7030:
6325:
465:
6351:
4543:
4431:
out of the world financial system... Iran's economy stagnated... Eventually, Tehran agreed to cut back its
3862:
3359:
2910:
1785:
1784:. The United States, like most nations, conducts espionage against other nations, under the control of the
1518:
1428:
1027:
936:
7153:
7138:
4161:
5486:
3676:
3455:
3037:
3012:
2967:
2512:
2413:
2066:
1828:
1487:
1266:
and detailed record keeping. Western espionage changed fundamentally during the Renaissance when Italian
3830:
6722:
6461:
6280:
5706:
5529:
4457:
4037:
3758:
3410:
2803:
2619:
beforehand. Those officers operating without diplomatic cover have no such immunity from prosecution".
2603:
2457:
1576:
1522:
1063:
626:
274:
20:
4365:
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
6255:
6105:
4288:
3772:
2503:
is an American CIA analyst, turned KGB mole, who was convicted of espionage in 1994; he is serving a
2310:
2218:
1808:. The reason given is: What about the Defense Department, and the Director of National Intelligence?.
1760:
920:
4393:, "The American Way of Economic war: Is Washington Overusing Its Most Powerful Weapons?" (review of
4323:
America's Secret War: Inside the Hidden Worldwide Struggle Between the United States and Its Enemies
2231:
important information from an agent that is attempting to seek allegiance with another country. The
2041:
In larger networks, the organization can be complex with many methods to avoid detection, including
5844:
5814:
5401:
5132:
2672:
2587:
2453:
2361:
1723:
1631:
1357:
967:
190:
71:
2861:, which has more graphic action and sex, as compared to other novels featuring male protagonists.
2530:. So far as it is known, Ames compromised the second-largest number of CIA agents, second only to
6837:
6344:
5453:
5443:
5391:
5122:
4772:
4742:
4634:
4445:
3032:
2178:
2042:
1871:
1546:
1099:
785:
7143:
6947:
6937:
6560:
6435:
6198:
6130:
5955:
5869:
5809:
5468:
5406:
5386:
5335:
5092:
4547:, vol. LXXI, no. 2 (8 February 2024), pp. 32, 34–35. "n Walton's view, there was scarcely a US
2797:
2094:
1333:
1532–1590) was appointed foreign secretary and intelligence chief. The novelist and journalist
957:
696:
686:
372:
221:
170:
123:
3959:
2590:
both decried his treatment. The BBC attributed some of the problems to tensions caused by the
1575:. Smaller countries can also mount effective and focused espionage efforts. For instance, the
6932:
6697:
6193:
5904:
5522:
5355:
5021:
3057:
3022:
2898:
2857:
2792:
2733:
2465:
2397:
2109:
2019:
1972:
1647:
1408:
1138:
1123:
1119:
1056:
977:
681:
601:
4102:
4041:
7025:
6942:
6927:
6823:
6009:
5731:
5458:
5396:
5282:
5238:
5223:
5172:
5117:
4947:
4930:
4903:
4666:
4551:
that was a long-term strategic success, with the possible exception of intervention in the
3007:
2823:
2811:
2681:
2640:
2631:
2559:
2515:
2435:
2296:
2203:
needed to further an intelligence service agenda. The use of the media to print a story to
2152:
2121:
2007:
1977:
1719:
1639:
1635:
1538:
1181:
1146:
771:
691:
676:
460:
28:
3577:
3415:"Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms"
3197:"Roman and Pontic Intelligence Strategies: Politics and War in the Time of Mithradates VI"
2227:: forced to mislead the foreign intelligence service after being caught as a double agent.
2038:
is a refuge for spies. Spies often seek to obtain secret information from another source.
1505:
and the Rosenberg Case. In 1952 the Communist Chinese captured two CIA agents and in 1960
8:
7115:
6491:
6379:
5914:
5864:
5834:
5804:
5726:
5691:
5491:
5365:
5182:
5009:
4913:
4360:
2920:
depicts a pair of none-too-bright men sent to the Soviet Union to investigate a missile.
2713:
2636:
2571:
2496:
was a Nazi spy who parachuted into Great Britain in 1941 and was executed for espionage.
2473:
2425:
2186:
1952:
1876:
1856:
1691:
1685:
1506:
1467:
1345:
1307:
1165:
915:
303:
255:
185:
175:
3243:
2570:, as well as officials who communicated with journalists for innocuous reasons, such as
2002:
A spy is a person employed to seek out top secret information from a source. Within the
1810:
Please help update this article to reflect recent events or newly available information.
1186:
Espionage has been recognized as of importance in military affairs since ancient times.
7173:
7040:
7020:
6985:
6975:
6595:
6576:
6506:
6415:
6285:
6037:
5854:
5786:
5756:
5601:
5591:
5463:
5448:
5340:
5315:
5253:
5204:
5189:
4898:
4865:
4839:
4817:
4812:
4782:
4767:
4627:
4412:
4249:
3941:
3906:
3903:
Crime Wars: The Global Intersection of Crime, Political Violence, and International Law
3798:
3421:
3224:
3216:
3177:
2833:
2500:
2461:
2279:
2196:
2027:
1937:
1922:
1897:
1861:
1765:
1651:
1616:
1604:
1550:
1530:
1502:
1432:
1326:
1303:
1019:
836:
826:
475:
455:
407:
388:
318:
215:
7188:
7045:
6883:
6536:
6501:
6237:
6024:
5839:
5576:
5305:
5014:
4683:
4552:
4511:
Hidden Secrets: A Complete History of Espionage and the Technology Used to Support It
4472:
4398:
4380:
4351:
4253:
4241:
4212:
4180:
4074:
4045:
4008:
3983:
3945:
3390:
3302:
3272:
3228:
3169:
2944:
2698:
2430:
2185:
gathering, this may include gathering information of a corporate business venture or
2171:
1510:
1440:
1361:
1216:
1126:, as it is by definition unwelcome. In some circumstances, it may be a legal tool of
998:
972:
857:
480:
348:
313:
3701:
1168:
is the practice of thwarting enemy espionage and intelligence-gathering. Almost all
7101:
6809:
6747:
6642:
6310:
6270:
6135:
6065:
5961:
5909:
5879:
5656:
5631:
5360:
5310:
4979:
4711:
4548:
4233:
4070:
4030:
3937:
3933:
3208:
3161:
2972:
2721:
2591:
2469:
2353:
2224:
1695:
1670:
1514:
947:
905:
900:
757:
651:
546:
241:
63:
2609:
2207:
a foreign service into action, exposing their operations while under surveillance.
7075:
7001:
6677:
6583:
6481:
6410:
6275:
6265:
6217:
6188:
6173:
6125:
6080:
6004:
5935:
5919:
5776:
5736:
5248:
5177:
4999:
4974:
4908:
4870:
4807:
4579:
4432:
4407:
4127:
3837:
3664:
3628:
3584:
3366:
3296:
2997:
2772:
2737:
2725:
2657:
2547:
2285:
2061:
These agents can be moles (who are recruited before they get access to secrets),
1927:
1777:
1773:
1600:
1424:
1353:
1299:
1169:
1127:
1110:. Any individual or spy ring (a cooperating group of spies), in the service of a
1095:
891:
581:
510:
436:
395:
293:
231:
161:
146:
6227:
4534:
2065:(who are recruited after they get access to secrets and leave their country) or
1994:
1634:, while the United States has tended to emphasize technological methods such as
1364:
was America's first spymaster, utilizing espionage tactics against the British.
7085:
7080:
7050:
6874:
6566:
6420:
6300:
6110:
6095:
6047:
5986:
5977:
5950:
5829:
5824:
5771:
5751:
5621:
5345:
5165:
4677:
4539:
Spying Through a Glass Darkly: The Ethics of Espionage and Counter-Intelligence
4416:
4333:
3900:
3382:
3334:
2992:
2819:
2729:
2567:
2543:
2531:
2477:
2449:
2357:
2317:
2204:
2023:
1932:
1851:
1751:
1731:
1676:
1526:
1471:
1436:
1372:
1283:
1275:
1236:
1212:
1194:
1189:
The oldest known classified document was a report made by a spy disguised as a
1003:
961:
520:
515:
485:
378:
67:
1557:
in 1962 implied the legitimacy of some espionage as an arm of foreign policy.
7167:
6819:
6717:
6521:
6471:
6315:
6260:
6232:
6222:
6178:
6100:
6090:
5994:
5945:
5899:
5894:
5874:
5746:
5721:
5711:
5671:
5641:
5636:
5606:
5263:
5243:
5228:
4957:
4925:
4827:
4802:
4721:
4245:
3819:
3212:
3173:
3027:
3002:
2987:
2916:
2849:
2841:
2829:
2815:
2579:
2563:
2555:
2504:
2249:
2015:
1962:
1917:
1727:
1711:
1444:
1404:
1400:
1263:
1220:
1198:
1190:
767:
621:
333:
283:
4598:
Spies, Lies, and Algorithms: The History and Future of American Intelligence
4216:
3841:
2896:
Espionage has also made its way into comedy depictions. The 1960s TV series
7125:
7060:
6667:
6556:
6541:
6320:
6295:
6183:
6140:
6115:
6070:
6052:
5940:
5859:
5849:
5799:
5761:
5701:
5696:
5681:
5676:
5666:
5661:
5651:
5581:
5514:
5350:
5268:
5258:
5199:
5004:
4792:
4777:
4716:
4701:
4694:
4556:
4449:
4390:
4272:(2nd ed. 2018); focus on the 21st century; reprints 30 essays by scholars.
3292:
2940:
2870:
2845:
2788:
2709:
2551:
2523:
2493:
2489:
2417:
2409:
2300:
2282:
information that can help lead to recruitment into an intelligence service.
2267:
2210:
2011:
1967:
1907:
1881:
1866:
1475:
1459:
1420:
1416:
1338:
1334:
1311:
1291:
1242:
1008:
571:
495:
368:
353:
265:
116:
7148:
5032:
4349:
Surveillance Tradecraft: The Professional's Guide to Surveillance Training
4224:
Winkler, Jonathan Reed (July 2009). "Information Warfare in World War I".
2448:
passed the Espionage Act of 1917. Over the years, many spies, such as the
2199:: provides political influence in an area of interest, possibly including
6831:
6827:
6737:
6486:
6400:
6305:
6290:
6145:
6085:
6075:
5999:
5819:
5794:
5766:
5741:
5716:
5646:
5616:
5586:
5160:
4994:
4860:
4706:
4424:
4370:
4328:
2767:
2760:
2677:
2661:
2445:
1747:
1580:
1554:
1534:
1396:
1392:
1349:
1315:
1255:
1247:
1153:
1142:
1023:
779:
775:
641:
298:
227:
151:
4490:
Knowing One's Enemies: Intelligence Assessment Before the Two World Wars
4273:
3840:, Rupa Jha, October 21, 2012, BBC (retrieved 2012-10-20) (Program link:
3220:
3196:
3165:
1462:, the activity of espionage has enlarged, much of it growing out of the
7120:
6906:
6789:
6784:
6662:
6546:
6526:
6516:
6496:
6450:
6425:
6395:
6032:
6014:
5889:
5884:
5626:
5611:
5596:
5233:
4989:
4969:
4962:
4942:
4849:
4453:
4385:
The Second Oldest Profession: Spies and Spying in the Twentieth Century
4237:
4067:
International Law in Historical Perspective: The laws of war. Part IX-A
2887:
2865:
2837:
2776:
2405:
2393:
2200:
2144:
2055:
2035:
1947:
1902:
1891:
1840:
1498:
1271:
1267:
1251:
1111:
1044:
930:
882:
737:
732:
566:
358:
338:
328:
308:
260:
180:
133:
3181:
3149:
7090:
7070:
7055:
6990:
6896:
6862:
6852:
6814:
6752:
6732:
6672:
6647:
6042:
5686:
5571:
5214:
5209:
4984:
4797:
4726:
4375:
Intelligence in War: Knowledge of the Enemy from Napoleon to Al-Qaeda
3301:(in German) (2 ed.). Munich: Koehler & Amelang. p. 38.
2982:
2775:, with a description of the training of an intelligence agent in the
2665:
2649:
2320:
for an established network of agents, usually considered "blue chip".
2278:
Access agent: provides access to other potential agents by providing
2062:
1886:
1743:
1620:
1542:
1452:
1412:
1380:
1367:
1157:
872:
841:
810:
800:
762:
656:
636:
576:
551:
525:
505:
490:
6444:
4591:
The Rise and Fall of Intelligence: An International Security History
3773:"Robert Hanssen, F.B.I. Agent Exposed as Spy for Moscow, Dies at 79"
2240:
occur when an officer has completed his term of service or when his
7010:
6980:
6901:
6847:
6799:
6774:
6756:
6692:
6657:
6628:
6610:
6605:
6588:
6551:
6531:
6168:
5566:
5218:
4832:
3087:
2936:
2705:
2653:
2518:
officer and analyst who committed espionage against his country by
2086:
2034:
who do not know the agent or case officer but transfer messages. A
1957:
1942:
1912:
1564:
1494:
1463:
1287:
1161:
993:
925:
877:
831:
795:
747:
722:
660:
596:
561:
445:
422:
417:
400:
363:
343:
140:
1201:
had a developed secret service, and espionage is mentioned in the
1122:, or independent operation, can commit espionage. The practice is
7110:
6952:
6918:
6888:
6857:
6804:
6779:
6727:
6707:
6702:
6682:
6652:
6615:
6600:
6511:
6476:
6336:
4918:
4601:
3532:
Beijing's spies cost German firms billions, says espionage expert
2686:
2401:
2214:
2131:
2046:
2031:
1479:
1295:
1226:
The thesis that espionage and intelligence has a central role in
1115:
910:
862:
805:
752:
727:
701:
631:
611:
606:
586:
556:
427:
412:
323:
288:
250:
108:
1603:, was particularly feared by Iranian dissidents before the 1979
1356:
achieved their fame as spies, and there was considerable use of
7015:
6842:
6712:
6571:
6405:
6160:
4564:
4436:
4140:
Spyscreen: Espionage on Film and TV from the 1930s to the 1960s
3106:
Journal of Organizational Effectiveness: People and Performance
2932:
2784:
2712:, eight German agents entered the U.S. in June 1942 as part of
2694:
2610:
Government intelligence laws and its distinction from espionage
2527:
2519:
2127:
1654:) officers were judged by the number of agents they recruited.
1568:
1533:. Among Western officials who defected to the Soviet Union are
1448:
1279:
1259:
1250:
European states excelled at what has later been termed counter-
790:
616:
450:
383:
211:
3680:
2931:
Black Widow is also a fictional agent who was introduced as a
2802:
written in 1821, about an American spy in New York during the
6742:
6687:
6637:
6368:
6209:
2534:, who also served a prison sentence until his death in 2023.
1596:
1592:
1584:
1572:
1560:
1231:
1208:
1203:
1131:
646:
591:
541:
54:
deal primarily with the United States and do not represent a
4619:
4529:
Shaw, Tamsin, "Ethical Espionage" (review of Calder Walton,
4403:
Underground Empire: How America Weaponized the World Economy
3901:
Paul Battersby; Joseph M. Siracusa; Sasho Ripiloski (2011).
3340:. Intelligence Resource Program, Central Intelligence Agency
2396:
of many nations. In the United States, it is covered by the
27:"Spy" and "Secret agent" redirect here. For other uses, see
7065:
6794:
4504:
Calculations: net assessment and the coming of World War II
4460:
4428:
4208:
3063:
Spying on United Nations leaders by United States diplomats
2747:
The U.S. codification of enemy spies is Article 106 of the
2554:. In the early 21st century, the act was used to prosecute
1588:
1306:. Venice became obsessed with espionage because successful
1013:
742:
500:
2736:
to prison terms. In 1948, they were released by President
2150:
In popular usage, this term is sometimes confused with an
2030:), supports and directs the human collector. Cut-outs are
4517:
A Century of Spies: Intelligence in the Twentieth Century
4032:
Romantics at War: Glory and Guilt in the Age of Terrorism
3715:
3091:
2957:
2914:
film trilogy portrays an inept spy, while the 1985 movie
2826:
characters that sold well from the 1920s to the present.
2717:
1746:. There are exceptions to physical meetings, such as the
1643:
1483:
1227:
4117:
Neutral Ground: A Political History of Espionage Fiction
3409:
2939:. She later became an agent of the fictional spy agency
2295:
Facilities agent: provides access to buildings, such as
1754:
in never meeting the people who bought his information.
1478:
have had a long tradition of espionage ranging from the
5504:
Counterintelligence and counter-terrorism organizations
4440:
2676:
intelligence about the enemy and communicate it to the
2507:
without the possibility of parole in the high-security
1262:. Inquisitions were marked by centrally organised mass
4531:
Spies: The Epic Intelligence War Between East and West
1666:
Broad areas of espionage targeting expertise include:
4342:
In Spies, We Trust: The Story of Western Intelligence
4331:, "Spy vs. Spy vs. Spy: How valuable is espionage?",
3537:
2424:(FBI), he faced life in prison; his contact, who had
1827:
Britain's espionage activities are controlled by the
6440:
4483:
Encyclopedia of Espionage, Intelligence and Security
3598:"CIA Status Improves Contractor's Case for Immunity"
2274:
Less common or lesser known forms of agent include:
1722:), and analysis of publicly available data sources (
2108:Communications both are necessary to espionage and
2058:, may attempt to infiltrate a target organization.
16:
Clandestine acquisition of confidential information
4268:Aldrich, Richard J., and Christopher Andrew, eds.
4029:
4027:
4005:The Contemporary Law Of Armed Conflict 2nd Edition
2832:achieved popularity as a fictional agent of early
2480:, and others have been prosecuted under this law.
2181:through the use of special privileges. If used in
1768:". Espionage is a violation of United States law,
1579:had consistently superior intelligence during the
1427:established elaborate espionage nets. In 1942 the
4502:Murray, Williamson, and Allan Reed Millett, eds.
4467:Lerner, Brenda Wilmoth & K. Lee Lerner, eds.
3519:Defectors say China running 1,000 spies in Canada
1358:spies on both sides during the American Civil War
7165:
4481:Lerner, K. Lee and Brenda Wilmoth Lerner, eds.
4064:
2392:Espionage against a nation is a crime under the
4573:Encyclopedia of the Central Intelligence Agency
4302:Intelligence Literature: Suggested Reading List
4002:
3723:"Aldrich Hazen Ames Register Number: 40087-083"
1310:demanded that the city-state could protect its
1102:). A person who commits espionage is called an
3790:
3449:
6352:
5530:
5048:
4635:
4485:(2003), worldwide recent coverage 1100 pages.
4367:, 1996 revised edition. First published 1967.
4316:A Short Course in the Secret War, 4th Edition
3194:
2342:The examples and perspective in this article
1383:and spy, with her chauffeur Boris Wolkowski (
1219:, when spies employed illiterate subjects in
1064:
52:The examples and perspective in this article
5544:
4452:(... the founder's daughter), had committed
3919:
3546:
3534:". The Sydney Morning Herald. July 25, 2009.
2483:
1834:
1595:, have highly developed operations as well.
5062:
4541:, Oxford University Press, 251 pp., 2024),
4283:The Secret World: A History of Intelligence
3729:. Federal Bureau of Prisons. Archived from
3445:
3443:
3441:
3269:The Secret World: A History of Intelligence
3043:Human intelligence (intelligence gathering)
2635:Painting of French spy captured during the
2597:
1282:became so obsessed with espionage that the
6359:
6345:
5537:
5523:
5055:
5041:
4642:
4628:
4559:) and perhaps support for the anti-Soviet
4205:The Evolution of British Sigint, 1653–1939
3053:List of intelligence gathering disciplines
2167:Among the most common forms of agent are:
1845:List of intelligence gathering disciplines
1701:
1071:
1057:
4533:, Simon and Schuster, 2023, 672 pp.; and
4028:George P. Fletcher (September 16, 2002).
2602:Espionage is illegal in the UK under the
2380:Learn how and when to remove this message
90:Learn how and when to remove this message
5155:
4661:
3964:International Committee of the Red Cross
3888:International Committee of the Red Cross
3796:
3438:
3291:
3147:
2630:
2537:
2270:: works for three intelligence services.
2081:assistance of a controller is required.
1993:
1366:
5469:Scientific & Technical intelligence
4223:
4202:
3694:
3669:
3571:
3381:
3241:
2943:and a member of the superhero team the
2177:Intelligence agent: provides access to
2115:
2076:is also employed for an individual who
1657:
1642:. In the Soviet Union, both political (
7166:
4892:Chinese espionage in the United States
4555:(a disastrous military fiasco for the
4007:. Juris Publishing, Inc. p. 142.
3679:. John Young Architect. Archived from
3471:
3469:
3467:
3465:
3360:"China's spying seeks secret US info."
3266:
3018:Chinese espionage in the United States
2137:
1718:), aircraft or satellite photography (
1391:In the 20th century, at the height of
1286:, which was nominally responsible for
1215:. Espionage was also prevalent in the
6340:
5518:
5036:
4623:
4439:... which... seemed poised to supply
3502:"Cyber Espionage to Combat Terrorism"
3195:Ă‘aco del Hoyo, Toni (November 2014).
3118:
3116:
3114:
1278:to collect intelligence. Renaissance
5291:By alliances, nations and industries
4887:Chinese intelligence activity abroad
4469:Terrorism: essential primary sources
4174:
4151:
3267:Andrew, Christopher (28 June 2018).
2935:spy, an antagonist of the superhero
2328:
2004:United States Intelligence Community
1790:
1583:. Some Islamic countries, including
38:
4953:Interpersonal (HUMINT) intelligence
4318:. Madison Books, November 19, 2001.
3926:The Journal of Intelligence History
3600:. New America Media. Archived from
3462:
2412:handed a stack of dossiers of U.S.
2069:(who get access but do not leave).
1740:intelligence collection disciplines
1511:flying a U-2 reconnaissance mission
13:
6366:
4261:
3450:Igor Primoratz (August 15, 2013).
3111:
2584:People's Union for Civil Liberties
2099:International Intelligence Limited
1525:, Peter Deriabin, Pawel Monat and
1466:between the United States and the
1197:, who died in around 1750 BC. The
1094:is the act of obtaining secret or
14:
7200:
4788:Computer and network surveillance
4615:History of an espionage in Russia
4608:
3677:"Aldrich Ames Criminal Complaint"
3332:
2742:American Zone of occupied Germany
2309:: lives in another country under
2164:who recruits and handles agents.
6958:Perverting the course of justice
6443:
6434:
6382:. Not all types are listed here.
4823:Short-range agent communications
4142:(Oxford University Press, 2003).
2868:world as well, in games such as
2749:Uniform Code of Military Justice
2333:
2316:Principal agent: functions as a
1795:
1782:Uniform Code of Military Justice
707:Perverting the course of justice
107:
43:
6698:Intellectual property violation
5439:Words of estimative probability
5301:Operational platforms by nation
4524:The U.S. Intelligence Community
4456:by falsely telling the British
4423:, which then uses high-powered
4344:(2013), covers U.S. and Britain
4226:The Journal of Military History
4168:
4145:
4132:
4109:
4087:
4058:
4021:
3996:
3970:
3952:
3913:
3894:
3876:
3847:
3824:
3812:
3765:
3747:
3651:
3633:
3615:
3590:
3524:
3511:
3494:
3403:
3375:
3352:
3335:"Intelligence in the Civil War"
2963:Federal Bureau of Investigation
2905:Agent 000 and the Deadly Curves
2422:Federal Bureau of Investigation
1989:
1615:Today, spy agencies target the
1320:
602:Intellectual property violation
4405:, Henry Holt, 2023, 288 pp.),
4196:
3938:10.1080/16161262.2006.10555131
3326:
3285:
3260:
3235:
3188:
3141:
3098:
3080:
2978:Cover (intelligence gathering)
2864:Spy fiction has permeated the
2754:
2511:. Ames was formerly a 31-year
1:
4649:
4600:(2022), university textbook.
4270:Secret Intelligence: A Reader
3979:2006 Operational Law Handbook
3797:Gerstein, Josh (2011-03-07).
3587:Mi5.gov. "How spies operate".
3069:
3048:List of intelligence agencies
2812:human interest news reporting
1610:
1330:
33:Secret agent (disambiguation)
6281:Vladimir Mikhaylovich Petrov
4586:, New York, Macmillan, 1962.
4544:The New York Review of Books
4095:"UCMJ – Article 106 – Spies"
3799:"Obama's hard line on leaks"
3074:
1786:National Clandestine Service
1429:Office of Strategic Services
1360:. Though not a spy himself,
937:Ignorantia juris non excusat
7:
7179:Law enforcement occupations
5487:Intelligence cycle security
3831:Your World: The Nowhere Man
3521:". CBC News. June 15, 2005.
3456:Martinus Nijhoff Publishers
3244:"Espionage in Ancient Rome"
3038:History of Soviet espionage
3013:American espionage in China
2968:Central Intelligence Agency
2950:
2791:. An even earlier work was
2509:Allenwood U.S. Penitentiary
2414:Central Intelligence Agency
2356:, discuss the issue on the
2130:is losing $ 12 billion and
1829:Secret Intelligence Service
1599:, the secret police of the
1497:, espionage cases included
1488:Central Intelligence Agency
1164:the enemy in various ways.
1141:purposes. Spying involving
66:, discuss the issue on the
10:
7205:
6723:Possessing stolen property
5707:Julius and Ethel Rosenberg
4458:financial services company
4289:Burnham, Frederick Russell
4038:Princeton University Press
3907:Greenwood Publishing Group
3859:MI5 - the Security Service
2758:
2604:National Security Act 2023
2303:operations, resupply, etc.
2119:
2010:" is more common usage. A
1838:
1541:of Great Britain in 1951,
1258:were staged to annihilate
1179:
1175:
627:Possessing stolen property
275:Offense against the person
25:
21:Espionage (disambiguation)
18:
7135:
7100:
7000:
6967:
6916:
6872:
6766:
6626:
6460:
6432:
6388:
6375:
6256:Alexander Gregory Barmine
6246:
6207:
6158:
6061:
6023:
5985:
5975:
5928:
5785:
5559:
5550:
5477:
5419:
5379:
5324:
5281:
5146:
5108:
5088:
5079:
5070:
4879:
4848:
4758:
4735:
4657:
4154:"The Emperor and the Spy"
4065:J. H. W. Verziji (1978).
3663:December 3, 2012, at the
3627:December 3, 2012, at the
3556:. cia.gov. Archived from
3271:. Penguin Books Limited.
3150:"Spies in Ancient Greece"
2664:and punishment—including
2484:History of espionage laws
1835:Technology and techniques
1804:This article needs to be
1623:as well as state actors.
1545:of West Germany in 1954,
1290:, did not even allow the
1130:and in others, it may be
921:Diminished responsibility
715:Crimes against the public
6822:(such as prohibition of
5815:Thomas Patrick Cavanaugh
5545:Soviet and Russian spies
4421:National Security Agency
4340:Jeffreys-Jones, Rhodri.
4003:Leslie C. Green (2000).
3583:January 6, 2011, at the
3481:International Spy Museum
3411:US Department of Defense
3213:10.1177/0968344513505528
3148:Richmond, J. A. (1998).
3128:International Spy Museum
2902:, the 1983 Finnish film
2771:by the English novelist
2673:Hague Convention of 1907
2598:Espionage laws in the UK
2588:Human Rights Law Network
2408:were. For example, when
2043:clandestine cell systems
1780:and Article 106a of the
1730:, reports from military
1632:research in open sources
1096:confidential information
850:Crimes against the state
770:(such as prohibition of
5454:Intelligence assessment
5444:All-source intelligence
5064:Intelligence management
4773:Covert listening device
4743:Intelligence assessment
4584:The Zimmermann Telegram
4522:Richelson, Jeffery T.
4515:Richelson, Jeffery T.
4488:May, Ernest R. (ed.).
4446:chief financial officer
4179:. Horizon Productions.
4177:The Emperor and the Spy
4158:TheEmperorAndTheSpy.com
3477:"Language of Espionage"
3033:Intelligence assessment
2925:The Emperor and the Spy
1872:Covert listening device
1750:, or the insistence of
1702:Methods and terminology
1474:and its successor, the
1134:and punishable by law.
534:Crimes against property
224:(also called violation)
7184:Positions of authority
6938:Miscarriage of justice
6131:John Alexander Symonds
5956:Harold James Nicholson
5810:Christopher John Boyce
5138:Operational techniques
5093:Special reconnaissance
4526:(1999, fourth edition)
4203:Johnson, John (1997).
4175:Katz, Stan S. (2019).
4152:Katz, Stan S. (2019).
3242:ehoward (2006-06-12).
2660:status and subject to
2644:
2626:
2324:
2183:corporate intelligence
2158:intelligence operative
2110:clandestine operations
2095:SCG International Risk
1999:
1761:Black's Law Dictionary
1738:Unlike other forms of
1388:
1294:to consult government
1234:was first advanced in
1092:intelligence gathering
986:Other common-law areas
819:Crimes against animals
687:Miscarriage of justice
669:Crimes against justice
6933:Malfeasance in office
6378:Note: Crimes vary by
6194:Stephen Joseph Ratkai
5022:Targeted surveillance
4570:Smith, W. Thomas Jr.
4099:About.com US Military
3757:. FBI. Archived from
3365:May 19, 2011, at the
3058:Military intelligence
3023:Clandestine operation
2923:The historical novel
2793:James Fenimore Cooper
2734:Franklin D. Roosevelt
2634:
2538:Use against non-spies
2466:Robert Philip Hanssen
2444:The United States in
2398:Espionage Act of 1917
2191:economic intelligence
2179:sensitive information
1997:
1973:Surveillance aircraft
1648:military intelligence
1577:Vietnamese communists
1409:Espionage Act of 1917
1370:
1156:. They can also find
1120:criminal organization
892:Defenses to liability
682:Malfeasance in office
7026:Cybersex trafficking
6790:Censorship violation
5732:Nadezhda Ulanovskaya
5459:Medical intelligence
5429:Competing hypotheses
5239:Industrial espionage
5224:Denial and deception
4948:Industrial espionage
4748:competing hypotheses
4298:Felix, Christopher
3855:"What is espionage?"
3755:"Aldrich Hazen Ames"
3358:Arrillaga, Pauline.
3108:, 2(2), pp. 134–156.
3008:Undercover operation
2883:No One Lives Forever
2824:private investigator
2740:and deported to the
2641:Alphonse de Neuville
2560:Thomas Andrews Drake
2436:Hugh Francis Redmond
2416:(CIA) agents in the
2362:create a new article
2354:improve this article
2344:may not represent a
2299:or offices used for
2258:deep cover operative
2153:intelligence officer
2122:Industrial espionage
2116:Industrial espionage
1978:Surveillance balloon
1658:Targets of espionage
1439:-Messner Group, the
1431:was founded by Gen.
1182:History of espionage
1147:industrial espionage
738:Censorship violation
461:Cybersex trafficking
72:create a new article
64:improve this article
29:Spy (disambiguation)
19:For other uses, see
6820:Illegal consumption
6492:Criminal negligence
5915:John Anthony Walker
5865:Clayton J. Lonetree
5805:David Sheldon Boone
5727:Alexander Ulanovsky
5692:William Ward Pigman
5492:Counterintelligence
5407:Technical (TECHINT)
5402:Open-source (OSINT)
5392:Geospatial (GEOINT)
5366:Casualty estimation
4580:Tuchman, Barbara W.
4561:Solidarity movement
4279:Andrew, Christopher
3818:See the article on
3647:on 3 December 2012.
3387:Inside the Aquarium
3298:Verschlusssache BND
2714:Operation Pastorius
2637:Franco-Prussian War
2572:Stephen Jin-Woo Kim
2516:counterintelligence
2474:John Anthony Walker
2426:diplomatic immunity
2138:Agents in espionage
1953:Side channel attack
1857:Biographic leverage
1692:Counterintelligence
1686:Military capability
1507:Francis Gary Powers
1346:American Revolution
1308:international trade
1270:installed resident
1166:Counterintelligence
916:Defense of property
768:Illegal consumption
304:Criminal negligence
204:Severity of offense
7021:Child sexual abuse
6986:Wildlife smuggling
6976:Cruelty to animals
6767:Against the public
6596:Negligent homicide
6507:False imprisonment
6462:Against the person
6286:Fyodor Raskolnikov
6121:Michael John Smith
5855:Andrew Daulton Lee
5845:Robert Lee Johnson
5757:Harry Dexter White
5592:Whittaker Chambers
5464:Military geography
5449:Basic intelligence
5387:Financial (FININT)
5328:signature (MASINT)
5254:One-way voice link
5190:Concealment device
4899:Cold War espionage
4866:Front organization
4840:Surveillance tools
4818:Phone surveillance
4813:One-way voice link
4768:Concealment device
4471:Thomas Gale 2006
4413:fiber-optic cables
4381:Knightley, Phillip
4321:Friedman, George.
4238:10.1353/jmh.0.0324
4126:2019-03-27 at the
3836:2019-09-15 at the
3777:The New York Times
3231:– via JSTOR.
2834:Cold War espionage
2795:'s classic novel,
2645:
2501:Aldrich Hazen Ames
2462:Aldrich Hazen Ames
2458:the Rosenberg ring
2454:Robert Lee Johnson
2280:offender profiling
2197:Agent-of-influence
2067:defectors in place
2028:non-official cover
2000:
1938:One-way voice link
1923:Non-official cover
1898:Front organisation
1862:Concealment device
1617:illegal drug trade
1605:Iranian Revolution
1551:Bernon F. Mitchell
1503:Whittaker Chambers
1433:William J. Donovan
1389:
1327:Francis Walsingham
837:Wildlife smuggling
827:Cruelty to animals
456:Child sexual abuse
408:Negligent homicide
319:False imprisonment
216:Indictable offense
160:Scope of criminal
7161:
7160:
7144:Wikimedia Commons
7102:Inchoate offenses
7046:Indecent exposure
6537:Human trafficking
6502:Domestic violence
6334:
6333:
6154:
6153:
6025:Portland spy ring
5971:
5970:
5840:Edward Lee Howard
5577:Elizabeth Bentley
5512:
5511:
5415:
5414:
5306:Direction finding
5296:In modern history
5277:
5276:
5030:
5029:
4684:Agent provocateur
4589:Warner, Michael.
4553:Soviet-Afghan War
4495:O'Toole, George.
4477:978-1-4144-0621-3
4444:data to that 's
4356:978-0-9535378-2-2
4186:978-0-9903349-4-1
4080:978-90-286-0148-2
4014:978-1-929446-03-2
3396:978-0-425-09474-7
3166:10.1093/gr/45.1.1
3154:Greece & Rome
3124:"Espionage Facts"
2804:Revolutionary War
2722:military tribunal
2699:international law
2682:lawful combatants
2431:persona non grata
2390:
2389:
2382:
2364:, as appropriate.
2311:false credentials
2172:Agent provocateur
2020:diplomatic status
1928:Numbers messaging
1825:
1824:
1710:). Codebreaking (
1677:Popular sentiment
1671:Natural resources
1547:William H. Martin
1539:Donald D. Maclean
1519:Victor Kravchenko
1458:Since the end of
1441:French Resistance
1362:George Washington
1217:Greco-Roman world
1199:ancient Egyptians
1081:
1080:
481:Indecent exposure
349:Human trafficking
314:Domestic violence
242:Inchoate offenses
100:
99:
92:
74:, as appropriate.
7196:
6810:Ethnic cleansing
6748:Trespass to land
6643:Arms trafficking
6453:
6448:
6447:
6438:
6361:
6354:
6347:
6338:
6337:
6326:Stig Wennerström
6271:Walter Krivitsky
6136:Edith Tudor-Hart
6066:Michael Bettaney
5983:
5982:
5962:Illegals Program
5910:George Trofimoff
5880:Earl Edwin Pitts
5657:William Malisoff
5632:David Greenglass
5560:1940s and before
5557:
5556:
5539:
5532:
5525:
5516:
5515:
5311:Traffic analysis
5283:Signals (SIGINT)
5118:Asset recruiting
5086:
5085:
5077:
5076:
5057:
5050:
5043:
5034:
5033:
4644:
4637:
4630:
4621:
4620:
4347:Jenkins, Peter.
4314:
4312:
4310:
4257:
4220:
4191:
4190:
4172:
4166:
4165:
4160:. Archived from
4149:
4143:
4136:
4130:
4115:Brett F. Woods,
4113:
4107:
4106:
4101:. Archived from
4091:
4085:
4084:
4071:Brill Publishers
4062:
4056:
4055:
4035:
4025:
4019:
4018:
4000:
3994:
3993:
3974:
3968:
3967:
3956:
3950:
3949:
3922:Natzweiler Trial
3917:
3911:
3910:
3898:
3892:
3891:
3880:
3874:
3873:
3871:
3870:
3861:. Archived from
3851:
3845:
3828:
3822:
3816:
3810:
3809:
3807:
3806:
3794:
3788:
3787:
3785:
3783:
3769:
3763:
3762:
3751:
3745:
3741:
3739:
3738:
3719:
3713:
3712:
3710:
3709:
3698:
3692:
3691:
3689:
3688:
3673:
3667:
3655:
3649:
3648:
3643:. Archived from
3637:
3631:
3619:
3613:
3612:
3610:
3609:
3594:
3588:
3575:
3569:
3568:
3566:
3565:
3550:
3544:
3541:
3535:
3528:
3522:
3515:
3509:
3508:
3506:
3498:
3492:
3491:
3489:
3487:
3473:
3460:
3459:
3447:
3436:
3435:
3433:
3432:
3426:
3420:. Archived from
3419:
3407:
3401:
3400:
3379:
3373:
3356:
3350:
3349:
3347:
3345:
3339:
3330:
3324:
3323:
3317:
3315:
3289:
3283:
3282:
3264:
3258:
3257:
3255:
3254:
3239:
3233:
3232:
3192:
3186:
3185:
3145:
3139:
3138:
3136:
3134:
3120:
3109:
3102:
3096:
3095:
3084:
2973:Covert operation
2787:in 19th century
2592:Kashmir conflict
2470:Jonathan Pollard
2385:
2378:
2374:
2371:
2365:
2337:
2336:
2329:
2292:in an operation.
1820:
1817:
1811:
1799:
1798:
1791:
1766:national defense
1515:Walter Krivitsky
1332:
1324:
1323: 1558–1603
1322:
1300:official secrets
1193:in the court of
1191:diplomatic envoy
1170:sovereign states
1073:
1066:
1059:
1030:
901:Actual innocence
758:Ethnic cleansing
652:Trespass to land
547:Arms trafficking
111:
104:
103:
95:
88:
84:
81:
75:
47:
46:
39:
36:
7204:
7203:
7199:
7198:
7197:
7195:
7194:
7193:
7164:
7163:
7162:
7157:
7131:
7130:
7129:
7096:
7095:
7094:
7076:Sex trafficking
7002:Sexual offenses
6996:
6995:
6994:
6968:Against animals
6963:
6962:
6961:
6912:
6911:
6910:
6868:
6867:
6866:
6762:
6761:
6760:
6678:False pretenses
6622:
6621:
6620:
6584:Preterintention
6456:
6449:
6442:
6439:
6430:
6384:
6371:
6365:
6335:
6330:
6276:Kerttu Nuorteva
6266:Dieter Gerhardt
6248:
6242:
6218:Hirohide Ishida
6203:
6189:Gerda Munsinger
6174:Jeffrey Delisle
6150:
6126:Dave Springhall
6081:Litzi Friedmann
6057:
6019:
6005:John Cairncross
5967:
5936:Evgeny Buryakov
5924:
5920:Jerry Whitworth
5905:Robert Thompson
5781:
5777:Anatoli Yatskov
5737:Julian Wadleigh
5546:
5543:
5513:
5508:
5473:
5411:
5397:Imagery (IMINT)
5375:
5336:Electro-optical
5327:
5326:Measurement and
5320:
5273:
5249:Numbers station
5178:Black operation
5142:
5104:
5066:
5061:
5031:
5026:
5000:Sting operation
4909:Black operation
4875:
4871:Limited hangout
4853:
4844:
4808:Numbers station
4760:
4754:
4731:
4671:
4653:
4648:
4611:
4606:
4596:Zegart, Amy B.
4408:Foreign Affairs
4387:, Norton, 1986.
4308:
4306:
4299:
4264:
4262:Further reading
4199:
4194:
4187:
4173:
4169:
4150:
4146:
4137:
4133:
4128:Wayback Machine
4114:
4110:
4093:
4092:
4088:
4081:
4073:. p. 143.
4063:
4059:
4052:
4026:
4022:
4015:
4001:
3997:
3990:
3982:. DIANE. 2010.
3976:
3975:
3971:
3958:
3957:
3953:
3918:
3914:
3899:
3895:
3882:
3881:
3877:
3868:
3866:
3853:
3852:
3848:
3842:The Nowhere Man
3838:Wayback Machine
3829:
3825:
3817:
3813:
3804:
3802:
3795:
3791:
3781:
3779:
3771:
3770:
3766:
3753:
3752:
3748:
3743:(Search result)
3736:
3734:
3721:
3720:
3716:
3707:
3705:
3700:
3699:
3695:
3686:
3684:
3675:
3674:
3670:
3665:Wayback Machine
3656:
3652:
3639:
3638:
3634:
3629:Wayback Machine
3620:
3616:
3607:
3605:
3596:
3595:
3591:
3585:Wayback Machine
3576:
3572:
3563:
3561:
3552:
3551:
3547:
3542:
3538:
3529:
3525:
3516:
3512:
3504:
3500:
3499:
3495:
3485:
3483:
3475:
3474:
3463:
3448:
3439:
3430:
3428:
3424:
3417:
3408:
3404:
3397:
3383:Suvorov, Victor
3380:
3376:
3367:Wayback Machine
3357:
3353:
3343:
3341:
3337:
3333:Allen, Thomas.
3331:
3327:
3313:
3311:
3309:
3290:
3286:
3279:
3265:
3261:
3252:
3250:
3240:
3236:
3193:
3189:
3146:
3142:
3132:
3130:
3122:
3121:
3112:
3103:
3099:
3086:
3085:
3081:
3077:
3072:
3067:
2998:Secret identity
2953:
2773:Rudyard Kipling
2763:
2757:
2738:Harry S. Truman
2726:Washington D.C.
2658:prisoner-of-war
2629:
2612:
2600:
2548:Father Coughlin
2540:
2492:; for example,
2486:
2428:, was declared
2386:
2375:
2369:
2366:
2351:
2338:
2334:
2327:
2286:Confusion agent
2252:: recruited to
2225:Redoubled agent
2187:stock portfolio
2140:
2124:
2118:
2018:, who may have
1992:
1982:
1847:
1837:
1821:
1815:
1812:
1809:
1800:
1796:
1704:
1660:
1613:
1601:Pahlavi dynasty
1523:Vladimir Petrov
1451:and the Polish
1354:Benedict Arnold
1319:
1302:could face the
1184:
1178:
1128:law enforcement
1104:espionage agent
1077:
1018:
582:False pretenses
511:Sex trafficking
437:Sexual offenses
396:Preterintention
232:Summary offense
96:
85:
79:
76:
61:
48:
44:
37:
26:
24:
17:
12:
11:
5:
7202:
7192:
7191:
7186:
7181:
7176:
7159:
7158:
7156:
7151:
7146:
7141:
7136:
7133:
7132:
7128:
7123:
7118:
7113:
7108:
7107:
7106:
7104:
7098:
7097:
7093:
7088:
7086:Sexual slavery
7083:
7081:Sexual assault
7078:
7073:
7068:
7063:
7058:
7053:
7048:
7043:
7038:
7033:
7028:
7023:
7018:
7013:
7008:
7007:
7006:
7004:
6998:
6997:
6993:
6988:
6983:
6978:
6973:
6972:
6971:
6969:
6965:
6964:
6960:
6955:
6950:
6945:
6940:
6935:
6930:
6925:
6924:
6923:
6921:
6914:
6913:
6909:
6904:
6899:
6894:
6891:
6886:
6881:
6880:
6879:
6877:
6870:
6869:
6865:
6860:
6855:
6850:
6845:
6840:
6835:
6817:
6812:
6807:
6805:Hostage-taking
6802:
6797:
6792:
6787:
6782:
6777:
6772:
6771:
6770:
6768:
6764:
6763:
6759:
6750:
6745:
6740:
6735:
6730:
6725:
6720:
6715:
6710:
6705:
6700:
6695:
6690:
6685:
6680:
6675:
6670:
6665:
6660:
6655:
6650:
6645:
6640:
6635:
6634:
6633:
6631:
6624:
6623:
6619:
6618:
6613:
6608:
6603:
6598:
6593:
6592:
6591:
6581:
6580:
6579:
6569:
6564:
6554:
6549:
6544:
6539:
6534:
6529:
6524:
6519:
6514:
6509:
6504:
6499:
6494:
6489:
6484:
6479:
6474:
6468:
6467:
6466:
6464:
6458:
6457:
6455:
6454:
6433:
6431:
6429:
6428:
6423:
6418:
6413:
6408:
6403:
6398:
6392:
6390:
6386:
6385:
6376:
6373:
6372:
6364:
6363:
6356:
6349:
6341:
6332:
6331:
6329:
6328:
6323:
6318:
6313:
6308:
6303:
6301:Vitaly Shlykov
6298:
6293:
6288:
6283:
6278:
6273:
6268:
6263:
6258:
6252:
6250:
6249:in combination
6244:
6243:
6241:
6240:
6235:
6230:
6225:
6220:
6214:
6212:
6205:
6204:
6202:
6201:
6196:
6191:
6186:
6181:
6176:
6171:
6165:
6163:
6156:
6155:
6152:
6151:
6149:
6148:
6143:
6138:
6133:
6128:
6123:
6118:
6113:
6111:Geoffrey Prime
6108:
6103:
6098:
6096:Melita Norwood
6093:
6088:
6083:
6078:
6073:
6068:
6062:
6059:
6058:
6056:
6055:
6050:
6048:Harry Houghton
6045:
6040:
6035:
6029:
6027:
6021:
6020:
6018:
6017:
6012:
6010:Donald Maclean
6007:
6002:
5997:
5991:
5989:
5987:Cambridge Five
5980:
5973:
5972:
5969:
5968:
5966:
5965:
5958:
5953:
5951:Robert Hanssen
5948:
5943:
5938:
5932:
5930:
5926:
5925:
5923:
5922:
5917:
5912:
5907:
5902:
5897:
5892:
5887:
5882:
5877:
5872:
5870:Richard Miller
5867:
5862:
5857:
5852:
5847:
5842:
5837:
5835:Reino Häyhänen
5832:
5830:Robert Hanssen
5827:
5825:James Hall III
5822:
5817:
5812:
5807:
5802:
5797:
5791:
5789:
5783:
5782:
5780:
5779:
5774:
5772:Flora Wovschin
5769:
5764:
5759:
5754:
5752:Nathaniel Weyl
5749:
5744:
5739:
5734:
5729:
5724:
5719:
5714:
5709:
5704:
5699:
5694:
5689:
5684:
5679:
5674:
5669:
5664:
5659:
5654:
5649:
5644:
5639:
5634:
5629:
5624:
5622:Harold Glasser
5619:
5614:
5609:
5604:
5599:
5594:
5589:
5584:
5579:
5574:
5569:
5563:
5561:
5554:
5548:
5547:
5542:
5541:
5534:
5527:
5519:
5510:
5509:
5507:
5506:
5501:
5500:
5499:
5489:
5483:
5481:
5475:
5474:
5472:
5471:
5466:
5461:
5456:
5451:
5446:
5441:
5436:
5434:Target-centric
5431:
5425:
5423:
5417:
5416:
5413:
5412:
5410:
5409:
5404:
5399:
5394:
5389:
5383:
5381:
5377:
5376:
5374:
5373:
5363:
5358:
5356:Radiofrequency
5353:
5348:
5343:
5338:
5332:
5330:
5322:
5321:
5319:
5318:
5313:
5308:
5303:
5298:
5293:
5287:
5285:
5279:
5278:
5275:
5274:
5272:
5271:
5266:
5261:
5256:
5251:
5246:
5241:
5236:
5231:
5226:
5221:
5212:
5207:
5202:
5197:
5192:
5187:
5186:
5185:
5175:
5170:
5169:
5168:
5163:
5152:
5150:
5144:
5143:
5141:
5140:
5135:
5130:
5125:
5120:
5114:
5112:
5106:
5105:
5103:
5102:
5101:
5100:
5089:
5083:
5081:Human (HUMINT)
5074:
5068:
5067:
5060:
5059:
5052:
5045:
5037:
5028:
5027:
5025:
5024:
5019:
5018:
5017:
5012:
5002:
4997:
4992:
4987:
4982:
4977:
4972:
4967:
4966:
4965:
4960:
4950:
4945:
4940:
4939:
4938:
4933:
4923:
4922:
4921:
4916:
4906:
4901:
4896:
4895:
4894:
4883:
4881:
4877:
4876:
4874:
4873:
4868:
4863:
4857:
4855:
4846:
4845:
4843:
4842:
4837:
4836:
4835:
4825:
4820:
4815:
4810:
4805:
4800:
4795:
4790:
4785:
4780:
4775:
4770:
4764:
4762:
4761:communications
4756:
4755:
4753:
4752:
4751:
4750:
4739:
4737:
4733:
4732:
4730:
4729:
4724:
4719:
4714:
4709:
4704:
4699:
4698:
4697:
4687:
4680:
4678:Agent handling
4674:
4672:
4670:
4669:
4664:
4658:
4655:
4654:
4647:
4646:
4639:
4632:
4624:
4618:
4617:
4610:
4609:External links
4607:
4605:
4604:
4602:online reviews
4594:
4587:
4577:
4568:
4527:
4520:
4513:
4507:
4500:
4493:
4486:
4479:
4465:
4399:Abraham Newman
4388:
4378:
4368:
4358:
4345:
4338:
4334:The New Yorker
4326:
4319:
4296:
4293:Taking Chances
4286:
4276:
4265:
4263:
4260:
4259:
4258:
4232:(3): 845–867.
4221:
4198:
4195:
4193:
4192:
4185:
4167:
4164:on 2019-09-26.
4144:
4138:Miller, Toby,
4131:
4108:
4105:on 2013-05-15.
4086:
4079:
4057:
4050:
4020:
4013:
3995:
3988:
3969:
3951:
3912:
3909:. p. 125.
3893:
3875:
3846:
3823:
3811:
3801:. politico.com
3789:
3764:
3761:on 2010-10-13.
3746:
3714:
3693:
3668:
3650:
3632:
3614:
3589:
3570:
3554:"Double Agent"
3545:
3536:
3523:
3510:
3493:
3461:
3458:. p. 214.
3437:
3413:(2007-07-12).
3402:
3395:
3374:
3351:
3325:
3307:
3284:
3277:
3259:
3234:
3207:(4): 401–421.
3201:War in History
3187:
3140:
3110:
3097:
3078:
3076:
3073:
3071:
3068:
3066:
3065:
3060:
3055:
3050:
3045:
3040:
3035:
3030:
3025:
3020:
3015:
3010:
3005:
3000:
2995:
2993:Secret service
2990:
2985:
2980:
2975:
2970:
2965:
2960:
2954:
2952:
2949:
2911:Johnny English
2759:Main article:
2756:
2753:
2730:electric chair
2628:
2625:
2611:
2608:
2599:
2596:
2568:Edward Snowden
2556:whistleblowers
2544:Eugene V. Debs
2539:
2536:
2532:Robert Hanssen
2485:
2482:
2478:James Hall III
2450:Soble spy ring
2388:
2387:
2348:of the subject
2346:worldwide view
2341:
2339:
2332:
2326:
2323:
2322:
2321:
2314:
2304:
2293:
2283:
2272:
2271:
2265:
2247:
2246:
2245:
2228:
2208:
2194:
2175:
2139:
2136:
2120:Main article:
2117:
2114:
2024:official cover
1991:
1988:
1981:
1980:
1975:
1970:
1965:
1960:
1955:
1950:
1945:
1940:
1935:
1933:Official cover
1930:
1925:
1920:
1915:
1910:
1905:
1900:
1895:
1889:
1884:
1879:
1874:
1869:
1864:
1859:
1854:
1852:Agent handling
1848:
1836:
1833:
1823:
1822:
1803:
1801:
1794:
1770:18 U.S.C.
1752:Robert Hanssen
1732:reconnaissance
1703:
1700:
1699:
1698:
1689:
1683:
1680:
1674:
1659:
1656:
1612:
1609:
1527:Oleg Penkovsky
1472:Russian Empire
1425:Imperial Japan
1373:Minna Craucher
1314:. Under Queen
1284:Council of Ten
1276:capital cities
1264:interrogations
1254:when Catholic
1237:The Art of War
1221:civil services
1213:Amarna letters
1195:King Hammurabi
1180:Main article:
1177:
1174:
1079:
1078:
1076:
1075:
1068:
1061:
1053:
1050:
1049:
1048:
1047:
1039:
1038:
1034:
1033:
1032:
1031:
1016:
1011:
1006:
1001:
996:
988:
987:
983:
982:
981:
980:
975:
970:
965:
955:
950:
945:
940:
933:
928:
923:
918:
913:
908:
903:
895:
894:
888:
887:
886:
885:
880:
875:
870:
865:
860:
852:
851:
847:
846:
845:
844:
839:
834:
829:
821:
820:
816:
815:
814:
813:
808:
803:
798:
793:
788:
783:
765:
760:
755:
753:Hostage-taking
750:
745:
740:
735:
730:
725:
717:
716:
712:
711:
710:
709:
704:
699:
694:
689:
684:
679:
671:
670:
666:
665:
664:
663:
654:
649:
644:
639:
634:
629:
624:
619:
614:
609:
604:
599:
594:
589:
584:
579:
574:
569:
564:
559:
554:
549:
544:
536:
535:
531:
530:
529:
528:
523:
521:Sexual slavery
518:
516:Sexual assault
513:
508:
503:
498:
493:
488:
483:
478:
473:
468:
463:
458:
453:
448:
440:
439:
433:
432:
431:
430:
425:
420:
415:
410:
405:
404:
403:
393:
392:
391:
381:
376:
366:
361:
356:
351:
346:
341:
336:
331:
326:
321:
316:
311:
306:
301:
296:
291:
286:
278:
277:
271:
270:
269:
268:
263:
258:
253:
245:
244:
238:
237:
236:
235:
225:
219:
206:
205:
201:
200:
199:
198:
193:
188:
183:
178:
173:
165:
164:
157:
156:
155:
154:
149:
144:
137:
127:
126:
120:
119:
113:
112:
98:
97:
58:of the subject
56:worldwide view
51:
49:
42:
15:
9:
6:
4:
3:
2:
7201:
7190:
7187:
7185:
7182:
7180:
7177:
7175:
7172:
7171:
7169:
7155:
7152:
7150:
7147:
7145:
7142:
7140:
7137:
7134:
7127:
7124:
7122:
7119:
7117:
7114:
7112:
7109:
7105:
7103:
7099:
7092:
7089:
7087:
7084:
7082:
7079:
7077:
7074:
7072:
7069:
7067:
7064:
7062:
7059:
7057:
7054:
7052:
7049:
7047:
7044:
7042:
7039:
7037:
7036:Homosexuality
7034:
7032:
7029:
7027:
7024:
7022:
7019:
7017:
7014:
7012:
7009:
7005:
7003:
6999:
6992:
6989:
6987:
6984:
6982:
6979:
6977:
6974:
6970:
6966:
6959:
6956:
6954:
6951:
6949:
6946:
6944:
6941:
6939:
6936:
6934:
6931:
6929:
6926:
6922:
6920:
6915:
6908:
6905:
6903:
6900:
6898:
6895:
6892:
6890:
6887:
6885:
6882:
6878:
6876:
6871:
6864:
6861:
6859:
6856:
6854:
6851:
6849:
6846:
6844:
6841:
6839:
6838:Miscegenation
6836:
6833:
6829:
6825:
6821:
6818:
6816:
6813:
6811:
6808:
6806:
6803:
6801:
6798:
6796:
6793:
6791:
6788:
6786:
6783:
6781:
6778:
6776:
6773:
6769:
6765:
6758:
6754:
6751:
6749:
6746:
6744:
6741:
6739:
6736:
6734:
6731:
6729:
6726:
6724:
6721:
6719:
6718:Pickpocketing
6716:
6714:
6711:
6709:
6706:
6704:
6701:
6699:
6696:
6694:
6691:
6689:
6686:
6684:
6681:
6679:
6676:
6674:
6671:
6669:
6666:
6664:
6661:
6659:
6656:
6654:
6651:
6649:
6646:
6644:
6641:
6639:
6636:
6632:
6630:
6625:
6617:
6614:
6612:
6609:
6607:
6604:
6602:
6599:
6597:
6594:
6590:
6587:
6586:
6585:
6582:
6578:
6575:
6574:
6573:
6570:
6568:
6565:
6562:
6558:
6555:
6553:
6550:
6548:
6545:
6543:
6540:
6538:
6535:
6533:
6530:
6528:
6525:
6523:
6522:Home invasion
6520:
6518:
6515:
6513:
6510:
6508:
6505:
6503:
6500:
6498:
6495:
6493:
6490:
6488:
6485:
6483:
6480:
6478:
6475:
6473:
6472:Assassination
6470:
6469:
6465:
6463:
6459:
6452:
6446:
6441:
6437:
6427:
6424:
6422:
6419:
6417:
6414:
6412:
6409:
6407:
6404:
6402:
6399:
6397:
6394:
6393:
6391:
6387:
6383:
6381:
6374:
6370:
6362:
6357:
6355:
6350:
6348:
6343:
6342:
6339:
6327:
6324:
6322:
6319:
6317:
6316:Richard Sorge
6314:
6312:
6311:Siddiq Ghouse
6309:
6307:
6304:
6302:
6299:
6297:
6294:
6292:
6289:
6287:
6284:
6282:
6279:
6277:
6274:
6272:
6269:
6267:
6264:
6262:
6261:Stig Bergling
6259:
6257:
6254:
6253:
6251:
6245:
6239:
6236:
6234:
6233:Hotsumi Ozaki
6231:
6229:
6226:
6224:
6223:Yotoku Miyagi
6221:
6219:
6216:
6215:
6213:
6211:
6206:
6200:
6197:
6195:
6192:
6190:
6187:
6185:
6182:
6180:
6179:Igor Gouzenko
6177:
6175:
6172:
6170:
6167:
6166:
6164:
6162:
6157:
6147:
6144:
6142:
6139:
6137:
6134:
6132:
6129:
6127:
6124:
6122:
6119:
6117:
6114:
6112:
6109:
6107:
6104:
6102:
6101:Alan Nunn May
6099:
6097:
6094:
6092:
6091:Percy Glading
6089:
6087:
6084:
6082:
6079:
6077:
6074:
6072:
6069:
6067:
6064:
6063:
6060:
6054:
6051:
6049:
6046:
6044:
6041:
6039:
6036:
6034:
6031:
6030:
6028:
6026:
6022:
6016:
6013:
6011:
6008:
6006:
6003:
6001:
5998:
5996:
5995:Anthony Blunt
5993:
5992:
5990:
5988:
5984:
5981:
5979:
5974:
5964:
5963:
5959:
5957:
5954:
5952:
5949:
5947:
5946:Peter Debbins
5944:
5942:
5939:
5937:
5934:
5933:
5931:
5927:
5921:
5918:
5916:
5913:
5911:
5908:
5906:
5903:
5901:
5900:Oscar Seborer
5898:
5896:
5895:Robert Soblen
5893:
5891:
5888:
5886:
5883:
5881:
5878:
5876:
5875:Ronald Pelton
5873:
5871:
5868:
5866:
5863:
5861:
5858:
5856:
5853:
5851:
5848:
5846:
5843:
5841:
5838:
5836:
5833:
5831:
5828:
5826:
5823:
5821:
5818:
5816:
5813:
5811:
5808:
5806:
5803:
5801:
5798:
5796:
5793:
5792:
5790:
5788:
5784:
5778:
5775:
5773:
5770:
5768:
5765:
5763:
5760:
5758:
5755:
5753:
5750:
5748:
5747:Bill Weisband
5745:
5743:
5740:
5738:
5735:
5733:
5730:
5728:
5725:
5723:
5722:Morton Sobell
5720:
5718:
5715:
5713:
5712:Alfred Sarant
5710:
5708:
5705:
5703:
5700:
5698:
5695:
5693:
5690:
5688:
5685:
5683:
5680:
5678:
5675:
5673:
5672:Isaiah Oggins
5670:
5668:
5665:
5663:
5660:
5658:
5655:
5653:
5650:
5648:
5645:
5643:
5642:John Herrmann
5640:
5638:
5637:Theodore Hall
5635:
5633:
5630:
5628:
5625:
5623:
5620:
5618:
5615:
5613:
5610:
5608:
5607:Judith Coplon
5605:
5603:
5600:
5598:
5595:
5593:
5590:
5588:
5585:
5583:
5580:
5578:
5575:
5573:
5570:
5568:
5565:
5564:
5562:
5558:
5555:
5553:
5549:
5540:
5535:
5533:
5528:
5526:
5521:
5520:
5517:
5505:
5502:
5498:
5497:organizations
5495:
5494:
5493:
5490:
5488:
5485:
5484:
5482:
5480:
5479:Dissemination
5476:
5470:
5467:
5465:
5462:
5460:
5457:
5455:
5452:
5450:
5447:
5445:
5442:
5440:
5437:
5435:
5432:
5430:
5427:
5426:
5424:
5422:
5418:
5408:
5405:
5403:
5400:
5398:
5395:
5393:
5390:
5388:
5385:
5384:
5382:
5378:
5371:
5367:
5364:
5362:
5359:
5357:
5354:
5352:
5349:
5347:
5344:
5342:
5339:
5337:
5334:
5333:
5331:
5329:
5323:
5317:
5314:
5312:
5309:
5307:
5304:
5302:
5299:
5297:
5294:
5292:
5289:
5288:
5286:
5284:
5280:
5270:
5267:
5265:
5264:Steganography
5262:
5260:
5257:
5255:
5252:
5250:
5247:
5245:
5244:Interrogation
5242:
5240:
5237:
5235:
5232:
5230:
5229:Eavesdropping
5227:
5225:
5222:
5220:
5216:
5213:
5211:
5208:
5206:
5203:
5201:
5198:
5196:
5193:
5191:
5188:
5184:
5181:
5180:
5179:
5176:
5174:
5171:
5167:
5164:
5162:
5159:
5158:
5157:
5154:
5153:
5151:
5149:
5145:
5139:
5136:
5134:
5133:Direct action
5131:
5129:
5128:Covert action
5126:
5124:
5121:
5119:
5116:
5115:
5113:
5111:
5107:
5099:
5098:organizations
5096:
5095:
5094:
5091:
5090:
5087:
5084:
5082:
5078:
5075:
5073:
5069:
5065:
5058:
5053:
5051:
5046:
5044:
5039:
5038:
5035:
5023:
5020:
5016:
5013:
5011:
5008:
5007:
5006:
5003:
5001:
4998:
4996:
4993:
4991:
4988:
4986:
4983:
4981:
4978:
4976:
4973:
4971:
4968:
4964:
4961:
4959:
4958:interrogation
4956:
4955:
4954:
4951:
4949:
4946:
4944:
4941:
4937:
4934:
4932:
4929:
4928:
4927:
4926:Eavesdropping
4924:
4920:
4917:
4915:
4912:
4911:
4910:
4907:
4905:
4902:
4900:
4897:
4893:
4890:
4889:
4888:
4885:
4884:
4882:
4878:
4872:
4869:
4867:
4864:
4862:
4859:
4858:
4856:
4851:
4847:
4841:
4838:
4834:
4831:
4830:
4829:
4828:Steganography
4826:
4824:
4821:
4819:
4816:
4814:
4811:
4809:
4806:
4804:
4803:Invisible ink
4801:
4799:
4796:
4794:
4791:
4789:
4786:
4784:
4781:
4779:
4776:
4774:
4771:
4769:
4766:
4765:
4763:
4757:
4749:
4746:
4745:
4744:
4741:
4740:
4738:
4734:
4728:
4725:
4723:
4722:Sleeper agent
4720:
4718:
4715:
4713:
4710:
4708:
4705:
4703:
4700:
4696:
4693:
4692:
4691:
4688:
4686:
4685:
4681:
4679:
4676:
4675:
4673:
4668:
4665:
4663:
4660:
4659:
4656:
4652:
4645:
4640:
4638:
4633:
4631:
4626:
4625:
4622:
4616:
4613:
4612:
4603:
4599:
4595:
4592:
4588:
4585:
4581:
4578:
4575:
4574:
4569:
4566:
4562:
4558:
4554:
4550:
4549:covert action
4546:
4545:
4540:
4536:
4532:
4528:
4525:
4521:
4518:
4514:
4512:
4509:Owen, David.
4508:
4505:
4501:
4498:
4494:
4491:
4487:
4484:
4480:
4478:
4474:
4470:
4466:
4462:
4459:
4455:
4451:
4447:
4442:
4438:
4434:
4430:
4426:
4422:
4418:
4414:
4410:
4409:
4404:
4400:
4396:
4395:Henry Farrell
4392:
4391:Krugman, Paul
4389:
4386:
4382:
4379:
4376:
4372:
4369:
4366:
4362:
4359:
4357:
4353:
4350:
4346:
4343:
4339:
4336:
4335:
4330:
4327:
4324:
4320:
4317:
4304:
4303:
4297:
4294:
4290:
4287:
4284:
4280:
4277:
4275:
4271:
4267:
4266:
4255:
4251:
4247:
4243:
4239:
4235:
4231:
4227:
4222:
4218:
4214:
4210:
4206:
4201:
4200:
4188:
4182:
4178:
4171:
4163:
4159:
4155:
4148:
4141:
4135:
4129:
4125:
4122:
4118:
4112:
4104:
4100:
4096:
4090:
4082:
4076:
4072:
4068:
4061:
4053:
4051:9780691006512
4047:
4043:
4039:
4034:
4033:
4024:
4016:
4010:
4006:
3999:
3991:
3989:9781428910676
3985:
3981:
3980:
3973:
3965:
3961:
3955:
3947:
3943:
3939:
3935:
3931:
3927:
3923:
3916:
3908:
3904:
3897:
3889:
3885:
3879:
3865:on 2013-11-01
3864:
3860:
3856:
3850:
3843:
3839:
3835:
3832:
3827:
3821:
3820:John Kiriakou
3815:
3800:
3793:
3778:
3774:
3768:
3760:
3756:
3750:
3744:
3733:on 2012-09-19
3732:
3728:
3724:
3718:
3703:
3697:
3683:on 2011-05-13
3682:
3678:
3672:
3666:
3662:
3659:
3654:
3646:
3642:
3636:
3630:
3626:
3623:
3618:
3604:on 2013-11-02
3603:
3599:
3593:
3586:
3582:
3579:
3574:
3560:on 2019-07-01
3559:
3555:
3549:
3540:
3533:
3527:
3520:
3514:
3503:
3497:
3482:
3478:
3472:
3470:
3468:
3466:
3457:
3453:
3446:
3444:
3442:
3427:on 2009-11-08
3423:
3416:
3412:
3406:
3398:
3392:
3388:
3384:
3378:
3372:, 7 May 2011.
3371:
3368:
3364:
3361:
3355:
3336:
3329:
3322:
3310:
3308:9783733802141
3304:
3300:
3299:
3294:
3293:Ulfkotte, Udo
3288:
3280:
3278:9780241305225
3274:
3270:
3263:
3249:
3245:
3238:
3230:
3226:
3222:
3218:
3214:
3210:
3206:
3202:
3198:
3191:
3183:
3179:
3175:
3171:
3167:
3163:
3159:
3155:
3151:
3144:
3129:
3125:
3119:
3117:
3115:
3107:
3101:
3093:
3089:
3083:
3079:
3064:
3061:
3059:
3056:
3054:
3051:
3049:
3046:
3044:
3041:
3039:
3036:
3034:
3031:
3029:
3028:Foreign agent
3026:
3024:
3021:
3019:
3016:
3014:
3011:
3009:
3006:
3004:
3003:Sleeper agent
3001:
2999:
2996:
2994:
2991:
2989:
2988:Special agent
2986:
2984:
2981:
2979:
2976:
2974:
2971:
2969:
2966:
2964:
2961:
2959:
2956:
2955:
2948:
2946:
2942:
2938:
2934:
2929:
2926:
2921:
2919:
2918:
2917:Spies Like Us
2913:
2912:
2907:
2906:
2901:
2900:
2894:
2892:
2890:
2885:
2884:
2879:
2878:
2877:GoldenEye 007
2873:
2872:
2867:
2862:
2860:
2859:
2853:
2851:
2850:Michael Caine
2848:as played by
2847:
2843:
2842:George Smiley
2839:
2835:
2831:
2830:Johnny Fedora
2827:
2825:
2821:
2817:
2816:Valerie Plame
2813:
2807:
2805:
2801:
2799:
2794:
2790:
2786:
2782:
2778:
2774:
2770:
2769:
2762:
2752:
2750:
2745:
2743:
2739:
2735:
2731:
2727:
2723:
2719:
2715:
2711:
2707:
2703:
2700:
2696:
2691:
2688:
2683:
2679:
2674:
2669:
2667:
2663:
2659:
2655:
2651:
2642:
2638:
2633:
2624:
2620:
2616:
2607:
2605:
2595:
2593:
2589:
2585:
2581:
2575:
2573:
2569:
2565:
2564:John Kiriakou
2561:
2557:
2553:
2549:
2545:
2535:
2533:
2529:
2525:
2521:
2517:
2514:
2510:
2506:
2505:life sentence
2502:
2497:
2495:
2491:
2481:
2479:
2475:
2471:
2467:
2463:
2459:
2455:
2451:
2447:
2442:
2439:
2437:
2433:
2432:
2427:
2423:
2419:
2415:
2411:
2407:
2403:
2399:
2395:
2384:
2381:
2373:
2363:
2359:
2355:
2349:
2347:
2340:
2331:
2330:
2319:
2315:
2312:
2308:
2307:Illegal agent
2305:
2302:
2298:
2294:
2291:
2287:
2284:
2281:
2277:
2276:
2275:
2269:
2266:
2263:
2259:
2255:
2251:
2250:Sleeper agent
2248:
2243:
2239:
2234:
2229:
2226:
2223:
2222:
2220:
2216:
2212:
2209:
2206:
2202:
2198:
2195:
2192:
2188:
2184:
2180:
2176:
2173:
2170:
2169:
2168:
2165:
2163:
2159:
2155:
2154:
2148:
2146:
2135:
2133:
2129:
2123:
2113:
2111:
2106:
2102:
2100:
2096:
2090:
2088:
2082:
2079:
2075:
2070:
2068:
2064:
2059:
2057:
2053:
2048:
2044:
2039:
2037:
2033:
2029:
2025:
2021:
2017:
2016:Special Agent
2013:
2009:
2005:
1996:
1987:
1986:
1979:
1976:
1974:
1971:
1969:
1966:
1964:
1963:Steganography
1961:
1959:
1956:
1954:
1951:
1949:
1946:
1944:
1941:
1939:
1936:
1934:
1931:
1929:
1926:
1924:
1921:
1919:
1918:Interrogation
1916:
1914:
1911:
1909:
1908:Impersonation
1906:
1904:
1901:
1899:
1896:
1893:
1890:
1888:
1885:
1883:
1880:
1878:
1875:
1873:
1870:
1868:
1865:
1863:
1860:
1858:
1855:
1853:
1850:
1849:
1846:
1842:
1832:
1830:
1819:
1816:December 2021
1807:
1802:
1793:
1792:
1789:
1787:
1783:
1779:
1775:
1771:
1767:
1763:
1762:
1755:
1753:
1749:
1745:
1741:
1736:
1733:
1729:
1728:interrogation
1725:
1721:
1717:
1713:
1712:cryptanalysis
1709:
1697:
1693:
1690:
1687:
1684:
1681:
1678:
1675:
1672:
1669:
1668:
1667:
1664:
1655:
1653:
1649:
1645:
1641:
1637:
1633:
1629:
1628:human sources
1624:
1622:
1618:
1608:
1606:
1602:
1598:
1594:
1590:
1586:
1582:
1578:
1574:
1570:
1566:
1562:
1558:
1556:
1552:
1548:
1544:
1540:
1536:
1532:
1528:
1524:
1520:
1516:
1512:
1508:
1504:
1500:
1496:
1491:
1489:
1485:
1481:
1477:
1473:
1469:
1465:
1461:
1456:
1454:
1450:
1446:
1445:Witte Brigade
1442:
1438:
1434:
1430:
1426:
1422:
1418:
1414:
1410:
1406:
1405:U.S. Congress
1402:
1401:United States
1398:
1394:
1386:
1382:
1379:), a Finnish
1378:
1374:
1369:
1365:
1363:
1359:
1355:
1351:
1347:
1342:
1340:
1336:
1328:
1317:
1313:
1312:trade secrets
1309:
1305:
1304:death penalty
1301:
1297:
1293:
1289:
1285:
1281:
1277:
1273:
1269:
1265:
1261:
1257:
1253:
1249:
1245:
1244:
1239:
1238:
1233:
1229:
1224:
1222:
1218:
1214:
1210:
1206:
1205:
1200:
1196:
1192:
1187:
1183:
1173:
1171:
1167:
1163:
1159:
1155:
1150:
1148:
1144:
1140:
1135:
1133:
1129:
1125:
1121:
1117:
1113:
1109:
1105:
1101:
1097:
1093:
1089:
1085:
1074:
1069:
1067:
1062:
1060:
1055:
1054:
1052:
1051:
1046:
1043:
1042:
1041:
1040:
1036:
1035:
1029:
1025:
1021:
1017:
1015:
1012:
1010:
1007:
1005:
1002:
1000:
997:
995:
992:
991:
990:
989:
985:
984:
979:
976:
974:
971:
969:
966:
963:
959:
956:
954:
953:Justification
951:
949:
946:
944:
941:
939:
938:
934:
932:
929:
927:
924:
922:
919:
917:
914:
912:
909:
907:
904:
902:
899:
898:
897:
896:
893:
890:
889:
884:
881:
879:
876:
874:
871:
869:
866:
864:
861:
859:
856:
855:
854:
853:
849:
848:
843:
840:
838:
835:
833:
830:
828:
825:
824:
823:
822:
818:
817:
812:
809:
807:
804:
802:
799:
797:
794:
792:
789:
787:
786:Miscegenation
784:
781:
777:
773:
769:
766:
764:
761:
759:
756:
754:
751:
749:
746:
744:
741:
739:
736:
734:
731:
729:
726:
724:
721:
720:
719:
718:
714:
713:
708:
705:
703:
700:
698:
695:
693:
690:
688:
685:
683:
680:
678:
675:
674:
673:
672:
668:
667:
662:
658:
655:
653:
650:
648:
645:
643:
640:
638:
635:
633:
630:
628:
625:
623:
622:Pickpocketing
620:
618:
615:
613:
610:
608:
605:
603:
600:
598:
595:
593:
590:
588:
585:
583:
580:
578:
575:
573:
570:
568:
565:
563:
560:
558:
555:
553:
550:
548:
545:
543:
540:
539:
538:
537:
533:
532:
527:
524:
522:
519:
517:
514:
512:
509:
507:
504:
502:
499:
497:
494:
492:
489:
487:
484:
482:
479:
477:
474:
472:
471:Homosexuality
469:
467:
464:
462:
459:
457:
454:
452:
449:
447:
444:
443:
442:
441:
438:
435:
434:
429:
426:
424:
421:
419:
416:
414:
411:
409:
406:
402:
399:
398:
397:
394:
390:
387:
386:
385:
382:
380:
377:
374:
370:
367:
365:
362:
360:
357:
355:
352:
350:
347:
345:
342:
340:
337:
335:
334:Home invasion
332:
330:
327:
325:
322:
320:
317:
315:
312:
310:
307:
305:
302:
300:
297:
295:
292:
290:
287:
285:
284:Assassination
282:
281:
280:
279:
276:
273:
272:
267:
264:
262:
259:
257:
254:
252:
249:
248:
247:
246:
243:
240:
239:
233:
229:
226:
223:
220:
217:
213:
210:
209:
208:
207:
203:
202:
197:
194:
192:
189:
187:
184:
182:
179:
177:
174:
172:
169:
168:
167:
166:
163:
159:
158:
153:
150:
148:
145:
143:
142:
138:
136:
135:
131:
130:
129:
128:
125:
122:
121:
118:
115:
114:
110:
106:
105:
102:
94:
91:
83:
80:February 2019
73:
69:
65:
59:
57:
50:
41:
40:
34:
30:
22:
7126:Solicitation
7061:Prostitution
7051:Masturbation
6884:Lèse-majesté
6873:Against the
6668:Embezzlement
6557:Manslaughter
6542:Intimidation
6380:jurisdiction
6377:
6321:Arne Treholt
6296:Ignace Reiss
6238:Ryūzō Sejima
6228:SanzĹŤ Nosaka
6184:Elena Miller
6141:John Vassall
6116:Goronwy Rees
6071:George Blake
6053:Konon Molody
6038:Morris Cohen
5960:
5941:Anna Chapman
5860:Robert Lipka
5850:Karl Koecher
5800:Aldrich Ames
5762:Maria Wicher
5702:Vincent Reno
5697:Lee Pressman
5682:Victor Perlo
5677:William Perl
5667:Boris Morros
5662:Hede Massing
5652:George Koval
5602:Morris Cohen
5582:Earl Browder
5269:Surveillance
5259:Resident spy
5200:Cryptography
5147:
5005:Surveillance
4793:Cyber spying
4778:Cryptography
4717:Resident spy
4702:Double agent
4682:
4650:
4597:
4590:
4583:
4571:
4542:
4538:
4535:CĂ©cile Fabre
4530:
4523:
4516:
4510:
4503:
4496:
4489:
4482:
4468:
4450:Meng Wanzhou
4406:
4402:
4384:
4374:
4371:Keegan, John
4364:
4348:
4341:
4332:
4329:Gopnik, Adam
4322:
4315:
4309:September 2,
4307:. Retrieved
4301:
4292:
4282:
4269:
4229:
4225:
4204:
4176:
4170:
4162:the original
4157:
4147:
4139:
4134:
4116:
4111:
4103:the original
4098:
4089:
4066:
4060:
4031:
4023:
4004:
3998:
3978:
3972:
3954:
3929:
3925:
3921:
3915:
3902:
3896:
3878:
3867:. Retrieved
3863:the original
3858:
3849:
3826:
3814:
3803:. Retrieved
3792:
3780:. Retrieved
3776:
3767:
3759:the original
3749:
3742:
3735:. Retrieved
3731:the original
3726:
3717:
3706:. Retrieved
3696:
3685:. Retrieved
3681:the original
3671:
3653:
3645:the original
3635:
3617:
3606:. Retrieved
3602:the original
3592:
3573:
3562:. Retrieved
3558:the original
3548:
3539:
3526:
3513:
3496:
3484:. Retrieved
3480:
3451:
3429:. Retrieved
3422:the original
3405:
3386:
3377:
3369:
3354:
3344:September 3,
3342:. Retrieved
3328:
3319:
3312:. Retrieved
3297:
3287:
3268:
3262:
3251:. Retrieved
3247:
3237:
3204:
3200:
3190:
3157:
3153:
3143:
3131:. Retrieved
3127:
3105:
3100:
3082:
2941:S.H.I.E.L.D.
2930:
2924:
2922:
2915:
2909:
2903:
2897:
2895:
2888:
2881:
2875:
2871:Perfect Dark
2869:
2863:
2858:The Baroness
2856:
2854:
2846:Harry Palmer
2828:
2808:
2796:
2789:Central Asia
2779:between the
2766:
2764:
2746:
2710:World War II
2704:
2692:
2670:
2646:
2621:
2617:
2613:
2601:
2576:
2552:World War II
2541:
2524:Soviet Union
2498:
2494:Josef Jakobs
2490:World War II
2487:
2443:
2440:
2429:
2418:Eastern Bloc
2410:Aldrich Ames
2391:
2376:
2367:
2343:
2289:
2273:
2268:Triple agent
2261:
2257:
2253:
2241:
2237:
2233:double agent
2232:
2211:Double agent
2201:publications
2190:
2182:
2166:
2162:case officer
2161:
2157:
2151:
2149:
2141:
2125:
2107:
2103:
2101:and others.
2091:
2083:
2077:
2073:
2071:
2060:
2051:
2040:
2012:case officer
2001:
1990:Organization
1984:
1983:
1968:Surveillance
1882:Cyber spying
1867:Covert agent
1826:
1813:
1805:
1759:
1756:
1737:
1705:
1665:
1661:
1625:
1614:
1559:
1492:
1476:Soviet Union
1460:World War II
1457:
1417:World War II
1397:great powers
1390:
1384:
1376:
1343:
1339:police-state
1335:Daniel Defoe
1318:of England (
1256:inquisitions
1243:Arthashastra
1241:
1235:
1225:
1202:
1188:
1185:
1154:enemy forces
1151:
1145:is known as
1143:corporations
1136:
1107:
1103:
1100:intelligence
1091:
1087:
1083:
1082:
978:Self-defense
935:
867:
858:Lèse-majesté
572:Embezzlement
496:Prostitution
486:Masturbation
369:Manslaughter
354:Intimidation
266:Solicitation
139:
132:
117:Criminal law
101:
86:
77:
53:
7031:Fornication
6948:Obstruction
6928:Compounding
6738:Tax evasion
6487:Child abuse
6401:Misdemeanor
6306:Herman Simm
6291:Alfred Redl
6247:Elsewhere /
6146:Arthur Wynn
6086:Klaus Fuchs
6076:David Crook
6000:Guy Burgess
5929:Post-Soviet
5820:Jack Dunlap
5795:Rudolf Abel
5767:Nathan Witt
5742:Harold Ware
5717:Saville Sax
5647:Donald Hiss
5617:Klaus Fuchs
5587:Boris Bukov
5341:Geophysical
5123:Cell system
5110:Clandestine
4995:Stay-behind
4904:Recruitment
4861:Canary trap
4759:Devices and
4707:Field agent
4567:." (p. 34.)
4425:computation
4361:Kahn, David
4197:Works cited
3641:"espionage"
3389:. Berkley.
3160:(1): 1–18.
3088:"Espionage"
2820:existential
2761:Spy fiction
2755:Spy fiction
2678:belligerent
2662:prosecution
2446:World War I
2370:August 2024
2219:fabricators
2126:Reportedly
1774:§§ 792
1748:Oslo Report
1581:Vietnam War
1555:Rudolf Abel
1535:Guy Burgess
1468:former USSR
1407:passed the
1399:except the
1393:World War I
1350:Nathan Hale
1344:During the
1316:Elizabeth I
1272:ambassadors
1268:city-states
1248:Middle Ages
1240:and in the
1230:as well as
1124:clandestine
973:Provocation
697:Obstruction
677:Compounding
642:Tax evasion
466:Fornication
299:Child abuse
228:Misdemeanor
152:Concurrence
7168:Categories
7139:WikiSource
7121:Incitement
7116:Conspiracy
6991:Bestiality
6943:Misprision
6907:Subversion
6863:War crimes
6858:Usurpation
6785:Corruption
6663:Cybercrime
6547:Kidnapping
6527:Hate crime
6517:Harassment
6497:Defamation
6451:Law portal
6426:Corruption
6416:Indictable
6396:Infraction
6033:Lona Cohen
6015:Kim Philby
5890:Myra Soble
5885:Jack Soble
5627:Harry Gold
5612:Noel Field
5597:Lona Cohen
5370:earthquake
5234:False flag
5072:Collection
4990:Sexpionage
4970:COINTELPRO
4963:safe house
4943:False flag
4880:Operations
4854:techniques
4850:Tradecraft
4454:bank fraud
4207:. London:
4040:. p.
3869:2013-08-16
3805:2011-03-19
3737:2014-01-03
3708:2011-03-19
3687:2011-03-19
3608:2013-08-17
3564:2010-05-14
3431:2007-10-01
3253:2023-12-21
3248:HistoryNet
3070:References
2889:Metal Gear
2886:, and the
2866:video game
2838:James Bond
2777:Great Game
2650:combatants
2406:Rosenbergs
2394:legal code
2145:false flag
2056:tradecraft
2036:safe house
1948:Safe house
1894:operations
1892:False flag
1841:Tradecraft
1839:See also:
1744:subterfuge
1621:terrorists
1611:Modern day
1499:Alger Hiss
1387:) in 1930s
1252:subversion
1211:, and the
1158:dissidents
1112:government
931:Entrapment
906:Automatism
883:Subversion
842:Bestiality
811:War crimes
806:Usurpation
733:Corruption
692:Misprision
567:Cybercrime
359:Kidnapping
339:Hate crime
329:Harassment
309:Defamation
261:Incitement
256:Conspiracy
222:Infraction
181:Complicity
176:Accomplice
134:Actus reus
7174:Espionage
7149:Wikiquote
7091:Voyeurism
7071:Pederasty
7056:Obscenity
6897:Secession
6893:Espionage
6853:Terrorism
6815:Smuggling
6753:Vandalism
6733:Smuggling
6673:Extortion
6648:Blackmail
6561:corporate
6367:Types of
6199:Fred Rose
6106:John Peet
6043:Ethel Gee
5687:J. Peters
5572:Joel Barr
5552:In the US
5361:Materials
5215:Defection
5210:Dead drop
5183:black bag
5148:Espionage
4914:black bag
4798:Dead drop
4727:Spymaster
4651:Espionage
4254:201749182
4246:1543-7795
3946:156655154
3932:(2): 41.
3704:. fas.org
3314:6 January
3229:220652440
3174:0017-3835
3075:Citations
2983:Detective
2899:Get Smart
2706:Saboteurs
2666:execution
2654:disguises
2580:stateless
2358:talk page
2262:activated
2244:is blown.
2063:defectors
1887:Dead drop
1758:nation".
1543:Otto John
1453:Home Army
1413:Mata Hari
1381:socialite
1341:methods.
1246:. In the
1084:Espionage
994:Contracts
968:Necessity
873:Secession
868:Espionage
801:Terrorism
763:Smuggling
657:Vandalism
637:Smuggling
577:Extortion
552:Blackmail
526:Voyeurism
506:Pederasty
491:Obscenity
373:corporate
196:Vicarious
191:Principal
186:Corporate
171:Accessory
162:liability
147:Causation
68:talk page
7189:Security
7154:Wikinews
7011:Adultery
6981:Poaching
6917:Against
6902:Sedition
6848:Regicide
6800:Genocide
6775:Apostasy
6757:Mischief
6693:Gambling
6658:Burglary
6629:property
6627:Against
6611:Stabbing
6606:Stalking
6589:Homicide
6552:Menacing
6532:Homicide
6169:Sam Carr
5787:Cold War
5567:John Abt
5421:Analysis
5219:Turncoat
5166:handling
4980:SHAMROCK
4833:microdot
4736:Analysis
4305:. US CIA
4217:52130886
4124:Archived
3834:Archived
3661:Archived
3625:Archived
3581:Archived
3385:(1987).
3363:Archived
3321:empfahl.
3295:(1997).
3221:26098615
2951:See also
2945:Avengers
2937:Iron Man
2558:such as
2522:for the
2352:You may
2215:Peddlers
2087:sabotage
2085:such as
2032:couriers
1958:Spy ship
1943:Sabotage
1913:Impostor
1903:Honeypot
1565:Mongolia
1495:Cold War
1464:Cold War
1296:archives
1288:security
1162:sabotage
1139:military
1009:Property
1004:Evidence
999:Defenses
948:Insanity
878:Sedition
832:Poaching
796:Regicide
748:Genocide
723:Apostasy
661:Mischief
597:Gambling
562:Burglary
446:Adultery
423:Stabbing
418:Stalking
401:Homicide
364:Menacing
344:Homicide
141:Mens rea
124:Elements
62:You may
7111:Attempt
6953:Perjury
6919:justice
6889:Treason
6832:smoking
6828:alcohol
6795:Dueling
6780:Begging
6728:Robbery
6708:Looting
6703:Larceny
6683:Forgery
6653:Bribery
6616:Torture
6601:Robbery
6559: (
6512:Frameup
6482:Battery
6477:Assault
6411:Summary
6389:Classes
5976:In the
5368: (
5346:Nuclear
5316:TEMPEST
4975:MINARET
4919:wetwork
4557:Soviets
4506:(1992).
4492:(1984).
4433:nuclear
4377:, 2003.
4295:, 1944.
4285:, 2018.
4274:excerpt
4119:(2008)
3727:Bop.gov
3622:treason
3578:Illegal
3543:Cia.gov
3486:12 July
3133:12 July
2933:Russian
2798:The Spy
2687:treason
2402:treason
2318:handler
2301:staging
2297:garages
2254:wake up
2205:mislead
2047:treason
2022:(i.e.,
1985:Source:
1877:Cut-out
1806:updated
1529:of the
1493:In the
1482:to the
1480:Okhrana
1421:Germany
1371:Madame
1176:History
1132:illegal
1116:company
1037:Portals
1028:estates
960: (
958:Mistake
943:Infancy
911:Consent
863:Treason
780:smoking
776:alcohol
743:Dueling
728:Begging
702:Perjury
632:Robbery
612:Looting
607:Larceny
587:Forgery
557:Bribery
428:Torture
413:Robbery
371: (
324:Frameup
294:Battery
289:Assault
251:Attempt
7041:Incest
7016:Bigamy
6843:Piracy
6830:, and
6713:Payola
6577:felony
6572:Murder
6567:Mayhem
6421:Hybrid
6406:Felony
6161:Canada
5205:Cutout
5156:Agents
5010:Global
4936:MASINT
4931:SIGINT
4783:Cutout
4667:Assets
4662:Agents
4593:(2014)
4576:(2003)
4565:Poland
4519:(1977)
4475:
4437:Huawei
4417:prisms
4354:
4252:
4244:
4215:
4183:
4121:online
4077:
4048:
4011:
3986:
3944:
3782:5 June
3658:spying
3393:
3305:
3275:
3227:
3219:
3182:643204
3180:
3172:
2908:, and
2891:series
2844:, and
2836:, but
2785:Russia
2695:airmen
2643:, 1880
2566:, and
2528:Russia
2520:spying
2290:target
2132:German
2128:Canada
2078:is not
2074:legend
2052:legend
1772:
1716:COMINT
1708:HUMINT
1646:) and
1636:SIGINT
1569:Russia
1470:. The
1449:Milorg
1443:, the
1395:, all
1280:Venice
1260:heresy
1207:, the
1088:spying
1024:trusts
962:of law
926:Duress
791:Piracy
778:, and
617:Payola
476:Incest
451:Bigamy
389:felony
384:Murder
379:Mayhem
212:Felony
6875:state
6824:drugs
6743:Theft
6688:Fraud
6638:Arson
6369:crime
6210:Japan
5380:Other
5351:Radar
5195:Cover
5173:Asset
5161:field
4695:Agent
4690:Cover
4250:S2CID
3942:S2CID
3505:(PDF)
3425:(PDF)
3418:(PDF)
3338:(PDF)
3225:S2CID
3217:JSTOR
3178:JSTOR
2652:wear
2360:, or
2242:cover
2189:. In
2160:, or
2008:asset
1724:OSINT
1720:IMINT
1696:moles
1640:IMINT
1630:over
1597:SAVAK
1593:Syria
1585:Libya
1573:India
1561:China
1437:Maier
1377:right
1232:peace
1209:Bible
1204:Iliad
1090:, or
1020:Wills
1014:Torts
772:drugs
647:Theft
592:Fraud
542:Arson
70:, or
7066:Rape
5015:Mass
4985:FVEY
4712:Mole
4499:1991
4473:ISBN
4461:HSBC
4429:Iran
4397:and
4352:ISBN
4325:2005
4311:2012
4242:ISSN
4213:OCLC
4209:HMSO
4181:ISBN
4075:ISBN
4046:ISBN
4009:ISBN
3984:ISBN
3784:2023
3488:2021
3391:ISBN
3346:2021
3316:2023
3303:ISBN
3273:ISBN
3170:ISSN
3135:2021
2783:and
2671:The
2586:and
2526:and
1843:and
1638:and
1619:and
1591:and
1589:Iran
1571:and
1549:and
1537:and
1423:and
1385:left
1352:and
1292:doge
1026:and
501:Rape
230:(or
214:(or
31:and
6208:In
6159:In
4852:and
4563:in
4234:doi
4042:106
3934:doi
3924:".
3209:doi
3162:doi
3092:MI5
2958:MI5
2768:Kim
2724:in
2718:FBI
2697:as
2639:by
2627:War
2550:in
2513:CIA
2325:Law
2238:may
2054:in
2026:or
2014:or
2006:, "
1778:798
1714:or
1652:GRU
1644:KGB
1531:GRU
1484:KGB
1325:),
1274:in
1228:war
1108:spy
1106:or
1045:Law
7170::
6826:,
6755:,
5978:UK
5217:/
4582:,
4537:,
4448:,
4441:5G
4401:,
4383:,
4373:,
4363:,
4291:,
4281:,
4248:.
4240:.
4230:73
4228:.
4211:.
4156:.
4097:.
4069:.
4044:.
4036:.
3962:.
3940:.
3928:.
3905:.
3886:.
3857:.
3775:.
3725:.
3479:.
3464:^
3454:.
3440:^
3370:AP
3318:.
3246:.
3223:.
3215:.
3205:21
3203:.
3199:.
3176:.
3168:.
3158:45
3156:.
3152:.
3126:.
3113:^
3090:.
2947:.
2893:.
2880:,
2874:,
2852:.
2806:.
2781:UK
2744:.
2668:.
2594:.
2574:.
2562:,
2476:,
2472:,
2468:,
2464:,
2460:,
2456:,
2452:,
2217:,
2156:,
2097:,
2089:.
2072:A
1831:.
1607:.
1587:,
1567:,
1521:,
1517:,
1509:,
1501:,
1447:,
1419:,
1411:.
1348:,
1331:c.
1321:r.
1223:.
1149:.
1118:,
1114:,
1086:,
1022:,
774:,
659:,
6834:)
6563:)
6360:e
6353:t
6346:v
5538:e
5531:t
5524:v
5372:)
5056:e
5049:t
5042:v
4643:e
4636:t
4629:v
4313:.
4256:.
4236::
4219:.
4189:.
4083:.
4054:.
4017:.
3992:.
3966:.
3948:.
3936::
3930:6
3890:.
3872:.
3844:)
3808:.
3786:.
3740:.
3711:.
3690:.
3611:.
3567:.
3530:"
3517:"
3507:.
3490:.
3434:.
3399:.
3348:.
3281:.
3256:.
3211::
3184:.
3164::
3137:.
3094:.
2800:,
2383:)
2377:(
2372:)
2368:(
2350:.
2264:.
1818:)
1814:(
1788:.
1776:–
1650:(
1375:(
1329:(
1098:(
1072:e
1065:t
1058:v
964:)
782:)
375:)
234:)
218:)
93:)
87:(
82:)
78:(
60:.
35:.
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.