Spies, Lies, and Algorithms : : The History and Future of American Intelligence / / Amy B. Zegart.
A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than o...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English |
---|---|
VerfasserIn: | |
Place / Publishing House: | Princeton, NJ : : Princeton University Press, , [2022] ©2022 |
Year of Publication: | 2022 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (424 p.) :; 11 b/w illus. 6 tables. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9780691223087 |
---|---|
ctrlnum |
(DE-B1597)600747 (OCoLC)1301550170 |
collection |
bib_alma |
record_format |
marc |
spelling |
Zegart, Amy B., author. aut http://id.loc.gov/vocabulary/relators/aut Spies, Lies, and Algorithms : The History and Future of American Intelligence / Amy B. Zegart. Princeton, NJ : Princeton University Press, [2022] ©2022 1 online resource (424 p.) : 11 b/w illus. 6 tables. text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Tables -- Figures -- Abbreviations and Acronyms -- 1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets -- 2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy -- 3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones -- 4 Intelligence Basics: Knowns and Unknowns -- 5 Why Analysis Is So Hard: The Seven Deadly Biases -- 6 Counterintelligence: To Catch A Spy -- 7 Covert Action “A Har d Business of Agonizing Choices” -- 8 Congressional Oversight: Eyes on Spies -- 9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World -- 10 Decoding Cyber Threats -- Acknowledgments -- Notes -- Selected Reading -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023) Cyber intelligence (Computer security) United States. Intelligence service United States. Public-private sector cooperation United States. Terrorism Government policy United States. POLITICAL SCIENCE / Security (National & International). bisacsh Abuse of authority. Al-Qaeda. Assassination. Atomic spies. Bribery. Bureau of Intelligence and Research. CIA Counterintelligence. Central Intelligence Agency. Circumstantial evidence. Clandestine HUMINT. Clandestine cell system. Classified information. Computer worm. Confirmation bias. Conspiracy theory. Counter-insurgency. Counter-terrorism. Counterintelligence. Counterterrorism Center. Covert operation. Cryptanalysis. Cryptography. Cyber threat intelligence. Cyber-attack. Demagogue. Denial and deception. Denial-of-service attack. Deterrence theory. Director of Central Intelligence. Director of National Intelligence. Director of the Central Intelligence Agency. Disinformation. Double agent. Drug lord. Electoral fraud. Encryption. Espionage. Fabricator (intelligence). Fake Claims. Generative Adversarial Networks. Hacking tool. Identity theft. Imminent Threat. Information asymmetry. Information overload. Information warfare. Insider threat. Insurgency. Intelligence Authorization Act. Intelligence Reform and Terrorism Prevention Act. Intelligence agency. Intelligence analysis. Intelligence officer. Iran–Contra affair. Jihadism. KGB. Lie detection. MafiaBoy. Malware. Mole (espionage). Mossad. NSA warrantless surveillance (2001–07). National Security Archive. National security. Nuclear warfare. On Intelligence. Osama bin Laden. Palmer Raids. Persecution. Policy. Political corruption. Political crime. Political repression. Rogue state. Sabotage. Sanctions against Iran. Secret Intelligence Service. Security agency. Sensitive Compartmented Information. Smuggling. Spy fiction. Spycatcher. Spymaster. State secrets privilege. Stuxnet. Subversion. Targeted killing. Terrorism. The Shadow Factory. Theft. Think Secret. Top Secret America. Trade secret. Undercover operation. United States Intelligence Community. United States State Department list of Foreign Terrorist Organizations. Vulnerability (computing). Warfare. Watergate scandal. Weapon of mass destruction. Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English 9783110993899 Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 9783110994810 ZDB-23-DGG Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2022 English 9783110994513 Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2022 9783110994407 ZDB-23-PLW Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2022 9783110749731 https://doi.org/10.1515/9780691223087?locatt=mode:legacy https://www.degruyter.com/isbn/9780691223087 Cover https://www.degruyter.com/document/cover/isbn/9780691223087/original |
language |
English |
format |
eBook |
author |
Zegart, Amy B., Zegart, Amy B., |
spellingShingle |
Zegart, Amy B., Zegart, Amy B., Spies, Lies, and Algorithms : The History and Future of American Intelligence / Frontmatter -- Contents -- Tables -- Figures -- Abbreviations and Acronyms -- 1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets -- 2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy -- 3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones -- 4 Intelligence Basics: Knowns and Unknowns -- 5 Why Analysis Is So Hard: The Seven Deadly Biases -- 6 Counterintelligence: To Catch A Spy -- 7 Covert Action “A Har d Business of Agonizing Choices” -- 8 Congressional Oversight: Eyes on Spies -- 9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World -- 10 Decoding Cyber Threats -- Acknowledgments -- Notes -- Selected Reading -- Index |
author_facet |
Zegart, Amy B., Zegart, Amy B., |
author_variant |
a b z ab abz a b z ab abz |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Zegart, Amy B., |
title |
Spies, Lies, and Algorithms : The History and Future of American Intelligence / |
title_sub |
The History and Future of American Intelligence / |
title_full |
Spies, Lies, and Algorithms : The History and Future of American Intelligence / Amy B. Zegart. |
title_fullStr |
Spies, Lies, and Algorithms : The History and Future of American Intelligence / Amy B. Zegart. |
title_full_unstemmed |
Spies, Lies, and Algorithms : The History and Future of American Intelligence / Amy B. Zegart. |
title_auth |
Spies, Lies, and Algorithms : The History and Future of American Intelligence / |
title_alt |
Frontmatter -- Contents -- Tables -- Figures -- Abbreviations and Acronyms -- 1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets -- 2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy -- 3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones -- 4 Intelligence Basics: Knowns and Unknowns -- 5 Why Analysis Is So Hard: The Seven Deadly Biases -- 6 Counterintelligence: To Catch A Spy -- 7 Covert Action “A Har d Business of Agonizing Choices” -- 8 Congressional Oversight: Eyes on Spies -- 9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World -- 10 Decoding Cyber Threats -- Acknowledgments -- Notes -- Selected Reading -- Index |
title_new |
Spies, Lies, and Algorithms : |
title_sort |
spies, lies, and algorithms : the history and future of american intelligence / |
publisher |
Princeton University Press, |
publishDate |
2022 |
physical |
1 online resource (424 p.) : 11 b/w illus. 6 tables. |
contents |
Frontmatter -- Contents -- Tables -- Figures -- Abbreviations and Acronyms -- 1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets -- 2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy -- 3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones -- 4 Intelligence Basics: Knowns and Unknowns -- 5 Why Analysis Is So Hard: The Seven Deadly Biases -- 6 Counterintelligence: To Catch A Spy -- 7 Covert Action “A Har d Business of Agonizing Choices” -- 8 Congressional Oversight: Eyes on Spies -- 9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World -- 10 Decoding Cyber Threats -- Acknowledgments -- Notes -- Selected Reading -- Index |
isbn |
9780691223087 9783110993899 9783110994810 9783110994513 9783110994407 9783110749731 |
callnumber-first |
J - Political Science |
callnumber-subject |
JK - United States |
callnumber-label |
JK468 |
callnumber-sort |
JK 3468 I6 Z418 42022 |
geographic_facet |
United States. |
url |
https://doi.org/10.1515/9780691223087?locatt=mode:legacy https://www.degruyter.com/isbn/9780691223087 https://www.degruyter.com/document/cover/isbn/9780691223087/original |
illustrated |
Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
320 - Political science |
dewey-ones |
327 - International relations |
dewey-full |
327.1273 |
dewey-sort |
3327.1273 |
dewey-raw |
327.1273 |
dewey-search |
327.1273 |
doi_str_mv |
10.1515/9780691223087?locatt=mode:legacy |
oclc_num |
1301550170 |
work_keys_str_mv |
AT zegartamyb spiesliesandalgorithmsthehistoryandfutureofamericanintelligence |
status_str |
n |
ids_txt_mv |
(DE-B1597)600747 (OCoLC)1301550170 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2022 English Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2022 Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2022 |
is_hierarchy_title |
Spies, Lies, and Algorithms : The History and Future of American Intelligence / |
container_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English |
_version_ |
1770176323455549440 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09605nam a22019815i 4500</leader><controlfield tag="001">9780691223087</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230502090707.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230502t20222022nju fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1302166076</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780691223087</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9780691223087</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)600747</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1301550170</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">JK468.I6</subfield><subfield code="b">Z418 2022</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JK468.I6</subfield><subfield code="b">Z418 2022</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">327.1273</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zegart, Amy B., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Spies, Lies, and Algorithms :</subfield><subfield code="b">The History and Future of American Intelligence /</subfield><subfield code="c">Amy B. Zegart.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (424 p.) :</subfield><subfield code="b">11 b/w illus. 6 tables.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Tables -- </subfield><subfield code="t">Figures -- </subfield><subfield code="t">Abbreviations and Acronyms -- </subfield><subfield code="t">1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets -- </subfield><subfield code="t">2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy -- </subfield><subfield code="t">3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones -- </subfield><subfield code="t">4 Intelligence Basics: Knowns and Unknowns -- </subfield><subfield code="t">5 Why Analysis Is So Hard: The Seven Deadly Biases -- </subfield><subfield code="t">6 Counterintelligence: To Catch A Spy -- </subfield><subfield code="t">7 Covert Action “A Har d Business of Agonizing Choices” -- </subfield><subfield code="t">8 Congressional Oversight: Eyes on Spies -- </subfield><subfield code="t">9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World -- </subfield><subfield code="t">10 Decoding Cyber Threats -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Selected Reading -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligence service</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public-private sector cooperation</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National & International).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Abuse of authority.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Al-Qaeda.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Assassination.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Atomic spies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bribery.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bureau of Intelligence and Research.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CIA Counterintelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Central Intelligence Agency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Circumstantial evidence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Clandestine HUMINT.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Clandestine cell system.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Classified information.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer worm.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Confirmation bias.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Conspiracy theory.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counter-insurgency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counter-terrorism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counterintelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counterterrorism Center.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Covert operation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptanalysis.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber threat intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber-attack.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Demagogue.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Denial and deception.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Denial-of-service attack.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Deterrence theory.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Director of Central Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Director of National Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Director of the Central Intelligence Agency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Disinformation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Double agent.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Drug lord.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electoral fraud.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Encryption.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Espionage.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fabricator (intelligence).</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fake Claims.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Generative Adversarial Networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking tool.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Identity theft.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Imminent Threat.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information asymmetry.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information overload.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information warfare.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Insider threat.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Insurgency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence Authorization Act.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence Reform and Terrorism Prevention Act.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence agency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence analysis.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence officer.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Iran–Contra affair.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Jihadism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">KGB.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Lie detection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">MafiaBoy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Malware.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mole (espionage).</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mossad.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NSA warrantless surveillance (2001–07).</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">National Security Archive.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">National security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Nuclear warfare.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">On Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Osama bin Laden.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Palmer Raids.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Persecution.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Policy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Political corruption.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Political crime.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Political repression.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Rogue state.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sabotage.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sanctions against Iran.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Secret Intelligence Service.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security agency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sensitive Compartmented Information.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smuggling.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Spy fiction.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Spycatcher.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Spymaster.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">State secrets privilege.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Stuxnet.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Subversion.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Targeted killing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Terrorism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">The Shadow Factory.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Theft.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Think Secret.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Top Secret America.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Trade secret.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Undercover operation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">United States Intelligence Community.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">United States State Department list of Foreign Terrorist Organizations.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Vulnerability (computing).</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Warfare.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Watergate scandal.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Weapon of mass destruction.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2022 English</subfield><subfield code="z">9783110993899</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2022</subfield><subfield code="z">9783110994810</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Political Science 2022 English</subfield><subfield code="z">9783110994513</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Political Science 2022</subfield><subfield code="z">9783110994407</subfield><subfield code="o">ZDB-23-PLW</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press Complete eBook-Package 2022</subfield><subfield code="z">9783110749731</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9780691223087?locatt=mode:legacy</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780691223087</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780691223087/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-074973-1 Princeton University Press Complete eBook-Package 2022</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-099389-9 EBOOK PACKAGE COMPLETE 2022 English</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-099451-3 EBOOK PACKAGE Political Science 2022 English</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-PLW</subfield><subfield code="b">2022</subfield></datafield></record></collection> |