Spies, Lies, and Algorithms : : The History and Future of American Intelligence / / Amy B. Zegart.

A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than o...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English
VerfasserIn:
Place / Publishing House:Princeton, NJ : : Princeton University Press, , [2022]
©2022
Year of Publication:2022
Language:English
Online Access:
Physical Description:1 online resource (424 p.) :; 11 b/w illus. 6 tables.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 09605nam a22019815i 4500
001 9780691223087
003 DE-B1597
005 20230502090707.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 230502t20222022nju fo d z eng d
019 |a (OCoLC)1302166076 
020 |a 9780691223087 
024 7 |a 10.1515/9780691223087  |2 doi 
035 |a (DE-B1597)600747 
035 |a (OCoLC)1301550170 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a nju  |c US-NJ 
050 0 0 |a JK468.I6  |b Z418 2022 
050 4 |a JK468.I6  |b Z418 2022 
072 7 |a POL012000  |2 bisacsh 
082 0 4 |a 327.1273  |2 23 
100 1 |a Zegart, Amy B.,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Spies, Lies, and Algorithms :  |b The History and Future of American Intelligence /  |c Amy B. Zegart. 
264 1 |a Princeton, NJ :   |b Princeton University Press,   |c [2022] 
264 4 |c ©2022 
300 |a 1 online resource (424 p.) :  |b 11 b/w illus. 6 tables. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t Contents --   |t Tables --   |t Figures --   |t Abbreviations and Acronyms --   |t 1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets --   |t 2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy --   |t 3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones --   |t 4 Intelligence Basics: Knowns and Unknowns --   |t 5 Why Analysis Is So Hard: The Seven Deadly Biases --   |t 6 Counterintelligence: To Catch A Spy --   |t 7 Covert Action “A Har d Business of Agonizing Choices” --   |t 8 Congressional Oversight: Eyes on Spies --   |t 9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World --   |t 10 Decoding Cyber Threats --   |t Acknowledgments --   |t Notes --   |t Selected Reading --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023) 
650 0 |a Cyber intelligence (Computer security)  |z United States. 
650 0 |a Intelligence service  |z United States. 
650 0 |a Public-private sector cooperation  |z United States. 
650 0 |a Terrorism  |x Government policy  |z United States. 
650 7 |a POLITICAL SCIENCE / Security (National & International).  |2 bisacsh 
653 |a Abuse of authority. 
653 |a Al-Qaeda. 
653 |a Assassination. 
653 |a Atomic spies. 
653 |a Bribery. 
653 |a Bureau of Intelligence and Research. 
653 |a CIA Counterintelligence. 
653 |a Central Intelligence Agency. 
653 |a Circumstantial evidence. 
653 |a Clandestine HUMINT. 
653 |a Clandestine cell system. 
653 |a Classified information. 
653 |a Computer worm. 
653 |a Confirmation bias. 
653 |a Conspiracy theory. 
653 |a Counter-insurgency. 
653 |a Counter-terrorism. 
653 |a Counterintelligence. 
653 |a Counterterrorism Center. 
653 |a Covert operation. 
653 |a Cryptanalysis. 
653 |a Cryptography. 
653 |a Cyber threat intelligence. 
653 |a Cyber-attack. 
653 |a Demagogue. 
653 |a Denial and deception. 
653 |a Denial-of-service attack. 
653 |a Deterrence theory. 
653 |a Director of Central Intelligence. 
653 |a Director of National Intelligence. 
653 |a Director of the Central Intelligence Agency. 
653 |a Disinformation. 
653 |a Double agent. 
653 |a Drug lord. 
653 |a Electoral fraud. 
653 |a Encryption. 
653 |a Espionage. 
653 |a Fabricator (intelligence). 
653 |a Fake Claims. 
653 |a Generative Adversarial Networks. 
653 |a Hacking tool. 
653 |a Identity theft. 
653 |a Imminent Threat. 
653 |a Information asymmetry. 
653 |a Information overload. 
653 |a Information warfare. 
653 |a Insider threat. 
653 |a Insurgency. 
653 |a Intelligence Authorization Act. 
653 |a Intelligence Reform and Terrorism Prevention Act. 
653 |a Intelligence agency. 
653 |a Intelligence analysis. 
653 |a Intelligence officer. 
653 |a Iran–Contra affair. 
653 |a Jihadism. 
653 |a KGB. 
653 |a Lie detection. 
653 |a MafiaBoy. 
653 |a Malware. 
653 |a Mole (espionage). 
653 |a Mossad. 
653 |a NSA warrantless surveillance (2001–07). 
653 |a National Security Archive. 
653 |a National security. 
653 |a Nuclear warfare. 
653 |a On Intelligence. 
653 |a Osama bin Laden. 
653 |a Palmer Raids. 
653 |a Persecution. 
653 |a Policy. 
653 |a Political corruption. 
653 |a Political crime. 
653 |a Political repression. 
653 |a Rogue state. 
653 |a Sabotage. 
653 |a Sanctions against Iran. 
653 |a Secret Intelligence Service. 
653 |a Security agency. 
653 |a Sensitive Compartmented Information. 
653 |a Smuggling. 
653 |a Spy fiction. 
653 |a Spycatcher. 
653 |a Spymaster. 
653 |a State secrets privilege. 
653 |a Stuxnet. 
653 |a Subversion. 
653 |a Targeted killing. 
653 |a Terrorism. 
653 |a The Shadow Factory. 
653 |a Theft. 
653 |a Think Secret. 
653 |a Top Secret America. 
653 |a Trade secret. 
653 |a Undercover operation. 
653 |a United States Intelligence Community. 
653 |a United States State Department list of Foreign Terrorist Organizations. 
653 |a Vulnerability (computing). 
653 |a Warfare. 
653 |a Watergate scandal. 
653 |a Weapon of mass destruction. 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE COMPLETE 2022 English  |z 9783110993899 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE COMPLETE 2022  |z 9783110994810  |o ZDB-23-DGG 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE Political Science 2022 English  |z 9783110994513 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t EBOOK PACKAGE Political Science 2022  |z 9783110994407  |o ZDB-23-PLW 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t Princeton University Press Complete eBook-Package 2022  |z 9783110749731 
856 4 0 |u https://doi.org/10.1515/9780691223087?locatt=mode:legacy 
856 4 0 |u https://www.degruyter.com/isbn/9780691223087 
856 4 2 |3 Cover  |u https://www.degruyter.com/document/cover/isbn/9780691223087/original 
912 |a 978-3-11-074973-1 Princeton University Press Complete eBook-Package 2022  |b 2022 
912 |a 978-3-11-099389-9 EBOOK PACKAGE COMPLETE 2022 English  |b 2022 
912 |a 978-3-11-099451-3 EBOOK PACKAGE Political Science 2022 English  |b 2022 
912 |a EBA_CL_SN 
912 |a EBA_EBKALL 
912 |a EBA_ECL_SN 
912 |a EBA_EEBKALL 
912 |a EBA_ESSHALL 
912 |a EBA_PPALL 
912 |a EBA_SSHALL 
912 |a GBV-deGruyter-alles 
912 |a PDA11SSHE 
912 |a PDA13ENGE 
912 |a PDA17SSHEE 
912 |a PDA5EBK 
912 |a ZDB-23-DGG  |b 2022 
912 |a ZDB-23-PLW  |b 2022