عرض عادي

Fair play : the moral dilemmas of spying / James M. Olson.

بواسطة:نوع المادة : نصنصالناشر:Washington, D.C. : Potomac Books, [2008]تاريخ حقوق النشر: copyright 2008الطبعات:1st paperback edوصف:xii, 291 pages ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781597971539 (pbk)
  • 1574889494
  • 9781574889499
الموضوع:تصنيف مكتبة الكونجرس:
  • JK468.I6 O47 2008
موارد على الانترنت:
المحتويات:
Introduction : a career under cover -- Philosophical and historical arguments -- Bible -- Aristotle -- Cicero -- St. Thomas Aquinas -- Machiavelli -- Kant -- Realpolitik -- Utilitarianism -- Veritatis Splendor -- U.S. attitudes toward spying -- Scenarios -- 1. Homosexual blackmail -- 2. Trojan horse -- 3. False flag -- 4. Hit team -- 5. Torture -- 6. Kidnapping and torture by surrogates -- 7. Truth serum -- 8. Journalism cover -- 9. Operational use of journalists -- 10. Human rights violators -- 11. Torture training -- 12. Humanitarian aid worker cover -- 13. Missionary cover -- 14. Operational use of academics -- 15. P-sources -- 16. Prostitute for terrorist -- 17. Child prostitute -- 18. Terrorist act for bona fides -- 19. Election tampering -- 20. Seduction and compromise -- 21. Romeo operations -- 22. Coercive pitch -- 23. Feeding a drug habit -- 24. Kidnapping or killing a defector -- 25. Fabricating evidence -- 26. L-devices -- 27. Insertion operations -- 28. Fake diagnosis -- 29. Drugging a foreign diplomat -- 30. Press placements -- 31. Fabricating academic credentials -- 32. Plagiarizing a Ph.D. dissertation -- 33. Exposing unwitting person to risk -- 34. Kamikaze dolphins -- 35. Spying on Americans overseas -- 36. Spying on friends -- 37. Spying on the United Nations -- 38. Industrial espionage -- 39. Bribing a foreign government -- 40. Tampering with U.S. mail -- 41. Protection of code breaking -- 42. Breaking a promise to an agent -- 43. Unauthorized cover -- 44. Bogus Websites and chatrooms -- 45. Back doors -- 46. Biological attack -- 47. Forging documents from friendly countries -- 48. Collateral damage -- 49. Foreign officer visitors -- 50. Interrogation -- Afterword -- Notes : Spying 101 -- The essential intelligence library -- Commentators.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة JK468.I6 O47 2008 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010000111705
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة JK468.I6 O47 2008 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010000111706

Includes bibliographical references (pages 263-268) and index.

Introduction : a career under cover -- Philosophical and historical arguments -- Bible -- Aristotle -- Cicero -- St. Thomas Aquinas -- Machiavelli -- Kant -- Realpolitik -- Utilitarianism -- Veritatis Splendor -- U.S. attitudes toward spying -- Scenarios -- 1. Homosexual blackmail -- 2. Trojan horse -- 3. False flag -- 4. Hit team -- 5. Torture -- 6. Kidnapping and torture by surrogates -- 7. Truth serum -- 8. Journalism cover -- 9. Operational use of journalists -- 10. Human rights violators -- 11. Torture training -- 12. Humanitarian aid worker cover -- 13. Missionary cover -- 14. Operational use of academics -- 15. P-sources -- 16. Prostitute for terrorist -- 17. Child prostitute -- 18. Terrorist act for bona fides -- 19. Election tampering -- 20. Seduction and compromise -- 21. Romeo operations -- 22. Coercive pitch -- 23. Feeding a drug habit -- 24. Kidnapping or killing a defector -- 25. Fabricating evidence -- 26. L-devices -- 27. Insertion operations -- 28. Fake diagnosis -- 29. Drugging a foreign diplomat -- 30. Press placements -- 31. Fabricating academic credentials -- 32. Plagiarizing a Ph.D. dissertation -- 33. Exposing unwitting person to risk -- 34. Kamikaze dolphins -- 35. Spying on Americans overseas -- 36. Spying on friends -- 37. Spying on the United Nations -- 38. Industrial espionage -- 39. Bribing a foreign government -- 40. Tampering with U.S. mail -- 41. Protection of code breaking -- 42. Breaking a promise to an agent -- 43. Unauthorized cover -- 44. Bogus Websites and chatrooms -- 45. Back doors -- 46. Biological attack -- 47. Forging documents from friendly countries -- 48. Collateral damage -- 49. Foreign officer visitors -- 50. Interrogation -- Afterword -- Notes : Spying 101 -- The essential intelligence library -- Commentators.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة