Espionage Research Papers - Academia.edu (original) (raw)

Mucho se ha discutido en medios de comunicación, debates académicos y grupos activistas sobre la extravagancia de la tipificación de los delitos atribuidos a Chelsea Manning. Por ejemplo, por el hecho de que resultó convicto de... more

Mucho se ha discutido en medios de comunicación, debates académicos y grupos activistas sobre la extravagancia de la tipificación de los delitos atribuidos a Chelsea Manning. Por ejemplo, por el hecho de que resultó convicto de “espionaje”, aunque sobreseído de un
cargo de “ayudar al enemigo” (es decir, una variante del delito de “traición”). Uno podría preguntarse “¿cuál enemigo?”, “¿cómo ayudó al enemigo exactamente?”, “¿a favor de quién espió, si no estaba al servicio de ningún país o empresa extranjeros y solo liberó cierta
información para que todo el mundo la supiese por igual?”, “¿por qué se castiga así a alguien que solo fue una fuente periodística que aportó datos de claro interés público, es decir, un “whistleblower”?”, “¿puede un soldado de un país cometer el delito de espionaje sin incurrir al mismo tiempo en el de traición? Para contribuir a echar luz sobre estas aparentes paradojas, en este trabajo se analiza la construcción del concepto de “enemigo” en la ley de Inteligencia de los Estados Unidos, en su código de justicia militar y en la acusación, la defensa y otros involucrados en el juicio a Manning. Complementariamente, también se examina el concepto
de “espía”.

In the autumn of 1962, two weeks before U-2 aerial photographs confirmed Soviet deployments of nuclear missiles in Cuba, the US intelligence community attempted to image the island with the spy satellite Corona. Insufficient image... more

In the autumn of 1962, two weeks before U-2 aerial photographs confirmed Soviet deployments of nuclear missiles in Cuba, the US intelligence community attempted to image the island with the spy satellite Corona. Insufficient image resolution and extensive cloud cover, however, prevented this photography from providing solid evidence confirming or denying the presence of offensive missiles. This event – previously unaddressed either by Missile Crisis or Corona scholars – illustrates both the promise and the limits of early satellite imagery intelligence. It further provides insight into the early imagery tasking and coordination process and demonstrates needs that drove further development of national satellite reconnaissance in the years that followed.

Skyfall (2012) signals a crisis in global espionage in a post-9/11 era of schizophrenic digital terror. James Bond and his enemy are both internally excluded from their agency-MI6-and this "abjection" leads to terrorist revenge and... more

Skyfall (2012) signals a crisis in global espionage in a post-9/11 era of schizophrenic digital terror. James Bond and his enemy are both internally excluded from their agency-MI6-and this "abjection" leads to terrorist revenge and sovereign reaffirmation. The latter involves a survival test for 007's vulnerable body while simultaneously recovering a national identity for the United Kingdom. In this sense, James Bond mirrors Jason Bourne, the ex-CIA agent in the Jason Bourne film series. Bourne undergoes a similar abjection yet becomes neither terrorist nor sovereign but instead a symptom of perpetual mind-games. This chapter compares Bond to Bourne to enable a cognitive mapping of the twenty-first-century espionage genre and its global system of sovereignty and abjection.

Espionage During the Cold War, the Soviet Union maintained a strong presence in Iceland, due to Iceland’s military importance and the American base in Keflavík. Despite a couple of incidents that revealed Soviet espionage in Iceland, no... more

Espionage
During the Cold War, the Soviet Union maintained a strong presence in Iceland, due to Iceland’s military importance and the American base in Keflavík. Despite a couple of incidents that revealed Soviet espionage in Iceland, no real Icelandic spies were ever caught. This final essay is a reflec­tion on Cold War spy mania, and raises the question of whether there were any Icelandic spies.

Religious groups existing on the fringes of US Society can quickly find themselves pushed outside the borders of acceptability by the onset of war, especially if they hold pacifist convictions and an avid desire to proselytise. Gary... more

Religious groups existing on the fringes of US Society can quickly find themselves pushed outside the borders of acceptability by the onset of war, especially if they hold pacifist convictions and an avid desire to proselytise. Gary Perkins shares the history of one such group, the International Bible Students Association.

How has secrecy shaped the collective memory of Bletchley Park? Collective memory helps to form our collective identity, an ideal that we should conform to. It gives us belonging, a sense of right and wrong and is what motivates us to... more

How has secrecy shaped the collective memory of Bletchley Park? Collective memory helps to form our collective identity, an ideal that we should conform to. It gives us belonging, a sense of right and wrong and is what motivates us to action. 1 Collective memory is therefore extremely powerful, but importantly is vulnerable to modification by inaccuracy, duplicity and omission. Intentional silence or suppression of information is therefore of great consequence to collective memory, and Bletchley Park functions as a stark demonstration of the consequence of enduring secrecy. The Second World War is perhaps the most defining instance in recent history that crafted a contextual identity that is still currently adhered to; Brexit, the 'War on Terrorism' and the Falkland war all revoke memories of WWII, either through " fighting tyranny " or facing up to a threat that demanded the British people evoke the " Blitz mentality " of uniting against a common enemy. 2 As a subject, history by its very nature, is almost assumed by non-historians to be an un-altering account of forgone conclusions, actions and results. While research occasionally uncovers novel treasures giving an alternative perspective on an historical event, it may be difficult to transform an identity previously forged in the collective memory to reflect this new information. 3 Monuments, memorials, remembrances, TV, film and media are examples of how, presently, we typically preserve a shared consciousness of historic events. Inclusion in these various media entrenches an individual or an event, whether fact or fiction, into the collective memory, and exclusion of a subject is commensurate to it never having occurred. The secrecy imperative to Bletchley Park and the work undertaken therein has inevitably led to an initially absent, though subsequently emerging, position in the collective memory of WWII. While government intelligence dates back millennia, the necessity for government secrecy was observed on a previously unprecedented scale during the course of WWII. 4 Bletchley was Britain's fortress of secrets and much of the information processed within its walls either remains under 1 For further works on the theory of collective memory see J.K. Olick The Collective Memory Reader, S. Freud Totem and

Translation of the book: Venice Secret Service

The objective scope of the analysis contained in the text concerns legal solutions to penalisation of the crime of espionage with regard to information security. As the main goal, the text performs an analysis of the crime of... more

The objective scope of the analysis contained in the text concerns legal solutions to penalisation of the crime of espionage with regard to information security. As the main goal, the text performs an analysis of the crime of espionage in the Polish substantive penal regulations, including a comparative analysis of corresponding Swedish substantive penal regulations.
In order to elaborate the research problem, the text addresses the following research questions: (1) To what degree do the legal solutions concerned with the penalisation of the crime of espionage provide effective prosecution and combating of this type of crime? (2) What changes in the scope of legal solutions penalising the acts of espionage can be proposed?
While the analysis contained in the text is for the most part a dogmatic and doctrinal approach, a comparative interpretation (with regard to substantive penal regulations penalising the crime of espionage in Poland and Sweden), as well as teleological and functional interpretations (with a view to reinterpreting selected, established or debated doctrinal approaches) are also applied.

Le roman, s’il est l’objet d’une lecture par les outils conceptuels des sciences humaines, contribue à dévoiler en partie ce que la littérature académique a désigné comme la « dimension manquante » des Relations internationales.... more

Le roman, s’il est l’objet d’une lecture par les outils conceptuels des sciences humaines, contribue à dévoiler en partie ce que la littérature académique a désigné comme la « dimension manquante » des Relations internationales. C’est-à-dire l’oubli relatif jusqu’aux années 1980 des problématiques du renseignement comme point de compréhension privilégié de la politique internationale.

Cet article plonge dans les méandres du monde de James Bond pour tenter de comprendre en quoi le célèbre espion britannique nous fait découvrir un au delà du réel. En considérant pleinement l'enjeu philosophique de ce brouillage de... more

Cet article plonge dans les méandres du monde de James Bond pour tenter de comprendre en quoi le célèbre espion britannique nous fait découvrir un au delà du réel. En considérant pleinement l'enjeu philosophique de ce brouillage de frontières, et avec l'aide de Derrida je pose la question suivante: en quoi l’espion nous propose un autre rapport au monde, ainsi qu’à la notion d’identité, se fondant non plus sur la lumière mais sur l’obscurité d’un ailleurs du réel ?

Book review of Cyber Espionage and International Law by Russell Buchan

The digital age has permanently changed the way states conduct political warfare—necessitating a rebalancing of security priorities in democracies. The utilisation of cyberspace by state and non-state actors to subvert democratic... more

The digital age has permanently changed the way states conduct political warfare—necessitating a rebalancing of security priorities in democracies. The utilisation of cyberspace by state and non-state actors to subvert democratic elections, encourage the proliferation of violence and challenge the sovereignty and values of democratic states is having a highly destabilising effect. Successful political warfare campaigns also cause voters to question the results of democratic elections and whether special interests or foreign powers have been the decisive factor in a given outcome. This is highly damaging for the political legitimacy of democracies, which depend upon voters being able to trust in electoral processes and outcomes free from malign influence— perceived or otherwise. The values of individual freedom and political expression practised within democratic states challenges their ability to respond to political warfare. The continued failure of governments to understand this has undermined their ability to combat this emerging threat. The challenges that this new digitally enabled political warfare poses to democracies is set to rise with developments in machine learning and the emergence of digital tools such as ‘deep fakes’.

Documents and audio from Alexander Siloti's daughter Kyriena.

Wilhelm Stieber greatly advanced intelligence and counterintelligence. His ideas paved the way for secret police forces and intelligence agencies for the future. He not only managed intelligence services but undertook dangerous work... more

Wilhelm Stieber greatly advanced intelligence and counterintelligence. His ideas paved the way for secret police forces and intelligence agencies for the future. He not only managed intelligence services but undertook dangerous work himself as an operative.

This present essay focuses on the information that Hispanic spies collected in the Levant during the sixteenth-century. Based on archival and literary sources, the study is built around the typical structure of a lyric opera to show the... more

This present essay focuses on the information that Hispanic spies collected in the Levant during the sixteenth-century. Based on archival and literary sources, the study is built around the typical structure of a lyric opera to show the worth of the secret correspondence such as archetype of European perception about the Ottoman Empire and, more generally, about all the Islam.
KEY WORDS: Intelligence; Secret information; Ottoman Empire; Hispanic Monarchy; Eastern Mediterranean; Otherness.

In Indian history, spying on citizens is as old as Rigveda. The system had developed as an intricate and sophisticated administrative science. Aphorisms like “spies are kings’ eyes” reflect an Indian tradition going back many centuries.... more

In Indian history, spying on citizens is as old as Rigveda. The system had developed as an intricate and sophisticated administrative science. Aphorisms like “spies are kings’ eyes” reflect an Indian tradition going back many centuries. In ancient India, spies were used in large number to ascertain the validity or lack of it in the statements of parties to litigation and witnesses and to collect correct and reliable information regarding any mass movement, rebellion or insurgency.

See index and opening essay. Self explanatory.

The objective scope of the research problem presented in the text covers a selection of issues concerned with the US espionage against Poland in the period between 1970 and 1989. The main goal of the text is to present the Polish... more

The objective scope of the research problem presented in the text covers a selection of issues concerned with the US espionage against Poland in the period between 1970 and 1989. The main goal of the text is to present the Polish intelligence services' state of knowledge and habits of mind concerned with the threats springing from the US spying activity. In order to elaborate the research problem, the following research questions have been presented: (1) What was the scope of the recognition of the US espionage by the Polish intelligence services in the period of 1970-1989?, (2) What areas of interest in the US espionage against Poland were predominant in the period of 1970-1989? The text focuses on: (1) an overall description of espionage in Poland (allowing for both the quantitative aspects of the phenomenon and the legal aspects), (2) areas of interest for the US intelligence in Poland (taking into account both the activity of US diplomatic posts and some selected spheres of interest to the US intelligence services, e.g. economy, industry and academia). The text uses material and documentation generated by the Ministry of the Interior and the Ministry of Defence (including subordinate institutions, e.g. special services) in the years 1970-1989. The theory of speech acts by J. L. Austin has been liberally used to critically analyse the material and documentation. Besides, a dogmatic interpretation of the law has been used to analyse the legal issues of espionage.

For those of you wondering why I recently took an impassioned interest in defending the Electoral College, the Intelligence Community Assessment (ICA) from the Office of the Director of National Intelligence on Russian meddling in the... more

Since 9/11 American intelligence has evolved in a changing atmosphere of modern tactics and techniques of information collection. This atmosphere, coupled with massive leaps in technological advancement such as social media, mobile... more

Since 9/11 American intelligence has evolved in a changing atmosphere of modern tactics and techniques of information collection. This atmosphere, coupled with massive leaps in technological advancement such as social media, mobile communications, processing analytics, large-form solid-state data storage and novel computational hardware and software equipment, has thrust the Intelligence Community into a strange new world of multi-dimensional intelligence. With the implementation of new technologies and the expansion of those technologies to public access whereas they were once reserved specifically for governments or major conglomerations, intelligence collection methods have increased far beyond than the traditional human intelligence capability. In addition, the incorporation of science and technology into a loosely termed ‘Technical Intelligence’ (TechInt) has become a major contributor to both data and strategy. While science and technology and human capability both remain valuable facets of the same overlapping intelligence construct, there is a growing trend of diametrically opposed camps setting one method over the other. This article explains how in terms of field application and intelligence information processing/analysis, both HumInt and TechInt are maximized by a mutual cooperation that at present does not exist.

Hubungan bilateral antara Indonesia dengan Australia tidak selalu stabil. Hubungan bilateral ini cenderung fluktuatif lengkap dengan pasang-surut kedekatannya yang dipengaruhi berbagai hal. Kasus yang terbilang masih hangat yang sempat... more

Hubungan bilateral antara Indonesia dengan Australia tidak selalu stabil. Hubungan bilateral ini cenderung fluktuatif lengkap dengan pasang-surut kedekatannya yang dipengaruhi berbagai hal. Kasus yang terbilang masih hangat yang sempat menggemparkan hubungan kedua negara tersebut adalah kasus penyadapan yang dilakukan oleh badan intelejen Australia terhadap para petinggi negara Indonesia yang terkuak pada tahun 2013 silam. Kepercayaan yang selama ini dibina di antara kedua negara menjadi berkurang dan dipertanyakan lagi esensi dan keperluannya. Dalam kasus ini Indonesia merasa Australia tidak menghargai kedaulatan Indonesia sebagai sebuah negara yang merdeka. Di sisi lain, beberapa kalangan Pemerintah Australia berkata bahwa spionase adalah hal yang biasa dilakukan dalam hubungan negara-negara (Saputra, Kebijakan Pemerintah Indonesia dalam Menyikapi Tindakan Penyadapan oleh Australia, 3) dan berkata bahwa Indonesia terlalu berlebihan dalam menyikapi kasus ini. ...

The Chinese Communist Party’s (CCP’s) intelligence system is focused on technology acquisition, political and military intelligence, and counter-subversion, using some techniques familiar in the West but others that are less so. Chinese... more

The Chinese Communist Party’s (CCP’s) intelligence system is focused on technology acquisition, political and military intelligence, and counter-subversion, using some techniques familiar in the West but others that are less so. Chinese historical models, Soviet techniques, Western practices, and the recent evolution of work under the CCP have all shaped today’s intelligence and counterintelligence (CI) community, including the Ministry of State Security (MSS, Guojia Anquanbu), the smaller CI effort under the Ministry of Public Security (MPS, Gonganbu), and the specialized collection efforts of the People’s Liberation Army (PLA) and other government bodies. A striking characteristic of the Chinese system since 1979 is the broad “actuarial” tasking employed for technology acquisition.

Is Barack Hussein Obama a creation of the U.S. Central Intelligence Agency? This paper explores that possibility.

Thèse de doctorat dirigée par Laurence van Ypersele et défendue à l'Université catholique de Louvain le 23 janvier 2006.

This article addresses the problem of legitimation under communist rule in Romania during the epoch of Nicolae Ceausescu (1965-89) by focusing on the communist spy novels published during a particular time span, that is, 1965-77.... more

This article addresses the problem of legitimation under communist rule in Romania during the epoch of Nicolae Ceausescu (1965-89) by focusing on the communist spy novels published during a particular time span, that is, 1965-77. Communist spy novels set forth a fictional character, the counterintelligence (Securitate) officer who fought on the "invisible front" against Western spies sent to Romania to steal "state secrets'". Such novels obviously obscured the repressive character of the Securitate and attempted at legitimating the communist rule.

During the Second World War the Abwehr, Germany's intelligence service, made concerted attempts to sabotage Britain. Not only did they train specialist saboteurs, they also recruited Irish and Welsh Nationalists and poured thousands of... more

During the Second World War the Abwehr, Germany's intelligence service, made concerted attempts to sabotage Britain. Not only did they train specialist saboteurs, they also recruited Irish and Welsh Nationalists and poured thousands of pounds into attacking key targets across the country. Using contemporary MI5 and MI6 sources, this work investigates the successes and failures of Sabotage in Britain.

The text is treats of the espionage against Poland in the period 1944-1989. The above analysis has been supplemented with the quantitative data from the period 1944-1984 as regards those convicted for participating in, acting... more

The text is treats of the espionage against Poland in the period 1944-1989. The above analysis has been supplemented with the quantitative data from the period 1944-1984 as regards those convicted for participating in, acting for, and passing on information to the foreign intelligence agencies. The espionage issues were presented on the example of the American intelligence activity, which was illustrated by the cases of persons who were convicted for espionage. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs, which were in its major part addressed to the Security Service and the Citizens’ Militia officers. The author made an attempt at the verification of the following research hypotheses: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination (1944-1989)?, (2) what was the level of foreign intelligence services’ interest in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland?

Francisco Ríos (c. 1872-c.1811), alias el Quitacapas, es un peligroso ladrón que llega a ser capitán de los cholos durante la Revolución del 25 de Mayo de 1809 en La Plata (Chuquisaca). En 1963, Gunnar Mendoza publica la "Causa criminal... more

Francisco Ríos (c. 1872-c.1811), alias el Quitacapas, es un peligroso ladrón que llega a ser capitán de los cholos durante la Revolución del 25 de Mayo de 1809 en La Plata (Chuquisaca).
En 1963, Gunnar Mendoza publica la "Causa criminal seguida de oficio por el alcalde ordinario de la Villa de Oruro contra Francisco Ríos, alias el Quitacapas, por vago, mal entretenido y otros crímenes (1809-1811). En 2009, su hijo Javier Mendoza Pizarro postula que la participación de Ríos en la Revolución es accidental. Empero, nueva información permite demostrar que Ríos tiene estrechas y duraderas relaciones con los revolucionarios.
En 1804, Ríos es cómplice del líder revolucionario paceño Tomás Rodríguez de Palma. Permanece encarcelado entre 1804 y 1808, cuando escapa y es indultado. Reclutado por otro líder insurgente, José Ramón de Loayza y Pacheco, en espía y emisario revolucionario en Yogas, Cochabamba y Oruro. Tiene una muy destacada participación en la Revolución de La Plata pero su pasado delictivo le impide repetir esto en La Paz. A pesar de ello, su violencia y criminalidad lo llevan a ser encarcelado por los mismos revolucionarios.

Reviews one of three books related to the Cold War: Scott Martell's The Fear Within, Alan Hornblum's The Invisible Harry Gold, Thomas Sakmyster's Red Conspirator, all of which appeared in the peer-reviewed Intelligencer: Journal of U.S.... more

Reviews one of three books related to the Cold War: Scott Martell's The Fear Within, Alan Hornblum's The Invisible Harry Gold, Thomas Sakmyster's Red Conspirator, all of which appeared in the peer-reviewed Intelligencer: Journal of U.S. Intelligence Studies, published by of the Association of Foreign Intelligence Officers (AFIO) Intelligencer: Journal of U.S. Intelligence Studies( September 2011): http://www.afio.com/publications/INTL_TableOfContents.pdf

Robert Hanssen, a career FBI Special Agent and " trusted insider " , was able to sell U.S. secrets to the Soviets and Russians for twenty-two years before his detection in December, 2000 by the FBI. Prior to Hanssen's arrest, the FBI's... more

Robert Hanssen, a career FBI Special Agent and " trusted insider " , was able to sell U.S. secrets to the Soviets and Russians for twenty-two years before his detection in December, 2000 by the FBI. Prior to Hanssen's arrest, the FBI's internal security programs were fragmented and contained severe deficiencies. These flaws made it relatively easy for Hanssen to commit espionage, and simultaneously, difficult for the FBI to identify him as an insider threat and ultimately arrest him. While the motivations and techniques surrounding espionage have significantly changed since the end of the Cold War, the " trusted insider " threat remains. This paper will examine the key aspects of the FBI's internal security program that enabled Hanssen to commit espionage, as well as some of the motivating factors behind his activity. A brief synopsis of Hanssen's background and FBI employment history will be included. However, the primary focus will be analysing Hanssen-era FBI security protocols and the 2002 Webster Commission Report, which was produced to examine the FBI's security programs and recommend methods to overhaul FBI internal security programs in light of the Hanssen case. The FBI's efforts to implement those recommendations, to effect a more technologically advanced and secure environment within the FBI, will also be examined.

The scope of the research problem encompasses selected issues concerning the content and sense of the elements characterizing the offense of espionage in Polish criminal law. In the legislation currently in force, the offense of espionage... more

The scope of the research problem encompasses selected issues concerning the content and sense of the elements characterizing the offense of espionage in Polish criminal law. In the legislation currently in force, the offense of espionage is criminalized under Art. 130 § 1-4 of the Criminal Code. The main purpose of the analysis is to perform a substantive criminal examination of the offense of espionage under Polish law, considering a practical case study and an assessment of the legal provisions regarding state security. In order to elaborate the material scope of the research problem and present the conclusions, the paper asks the following research questions: (1) To what extent are the de lege lata legal solutions in Poland effective in counteracting espionage offenses?, (2) What de lege ferenda solutions ought to be proposed to improve effective counteraction of espionage offenses? The paper includes an institutional and legal analysis aided by textual, functional, and historical interpretations, supplemented with the author's conclusions and opinions concerning de lege lata and de lege ferenda solutions. The institutional and legal analysis is supplemented with a case study of espionage activity. The case study helps consider selected legal problems and presents example legal classifications of the described acts associated with espionage activity.