Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Washington, D.C. : Potomac Books
    UID:
    (DE-604)BV043085396
    Format: 1 Online-Ressource (xii, 291 pages)
    Edition: 1st ed
    ISBN: 1574889494 , 1597973122 , 9781574889499 , 9781597973120
    Note: Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 , Includes bibliographical references (pages 263-268) and index , Introduction : a career under cover -- Philosophical and historical arguments -- Bible -- Aristotle -- Cicero -- St. Thomas Aquinas -- Machiavelli -- Kant -- Realpolitik -- Utilitarianism -- Veritatis Splendor -- U.S. attitudes toward spying -- Scenarios -- 1. Homosexual blackmail -- 2. Trojan horse -- 3. False flag -- 4. Hit team -- 5. Torture -- 6. Kidnapping and torture by surrogates -- 7. Truth serum -- 8. Journalism cover -- 9. Operational use of journalists -- 10. Human rights violators -- 11. Torture training -- 12. Humanitarian aid worker cover -- 13. Missionary cover -- 14. Operational use of academics -- 15. P-sources -- 16. Prostitute for terrorist -- 17. Child prostitute -- 18. Terrorist act for bona fides -- 19. Election tampering -- 20. Seduction and compromise -- 21. Romeo operations -- 22. Coercive pitch -- 23. Feeding a drug habit -- 24. Kidnapping or killing a defector -- 25. Fabricating evidence -- 26. L-devices -- 27. Insertion operations -- 28. Fake diagnosis -- 29. Drugging a foreign diplomat -- 30. Press placements -- 31. Fabricating academic credentials -- 32. Plagiarizing a Ph. D. dissertation -- 33. Exposing unwitting person to risk -- 34. Kamikaze dolphins -- 35. Spying on Americans overseas -- 36. Spying on friends -- 37. Spying on the United Nations -- 38. Industrial espionage -- 39. Bribing a foreign government -- 40. Tampering with U.S. mail -- 41. Protection of code breaking -- 42. Breaking a promise to an agent -- 43. Unauthorized cover -- 44. Bogus Websites and chatrooms -- 45. Back doors -- 46. Biological attack -- 47. Forging documents from friendly countries -- 48. Collateral damage -- 49. Foreign officer visitors -- 50. Interrogation -- Afterword -- Notes : Spying 101 -- The essential intelligence library -- Commentators
    Language: English
    Keywords: Fallstudiensammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages