Spies, Lies, and Algorithms : : The History and Future of American Intelligence / / Amy B. Zegart.

A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than o...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English
VerfasserIn:
Place / Publishing House:Princeton, NJ : : Princeton University Press, , [2022]
©2022
Year of Publication:2022
Language:English
Online Access:
Physical Description:1 online resource (424 p.) :; 11 b/w illus. 6 tables.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9780691223087
ctrlnum (DE-B1597)600747
(OCoLC)1301550170
collection bib_alma
record_format marc
spelling Zegart, Amy B., author. aut http://id.loc.gov/vocabulary/relators/aut
Spies, Lies, and Algorithms : The History and Future of American Intelligence / Amy B. Zegart.
Princeton, NJ : Princeton University Press, [2022]
©2022
1 online resource (424 p.) : 11 b/w illus. 6 tables.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Tables -- Figures -- Abbreviations and Acronyms -- 1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets -- 2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy -- 3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones -- 4 Intelligence Basics: Knowns and Unknowns -- 5 Why Analysis Is So Hard: The Seven Deadly Biases -- 6 Counterintelligence: To Catch A Spy -- 7 Covert Action “A Har d Business of Agonizing Choices” -- 8 Congressional Oversight: Eyes on Spies -- 9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World -- 10 Decoding Cyber Threats -- Acknowledgments -- Notes -- Selected Reading -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023)
Cyber intelligence (Computer security) United States.
Intelligence service United States.
Public-private sector cooperation United States.
Terrorism Government policy United States.
POLITICAL SCIENCE / Security (National & International). bisacsh
Abuse of authority.
Al-Qaeda.
Assassination.
Atomic spies.
Bribery.
Bureau of Intelligence and Research.
CIA Counterintelligence.
Central Intelligence Agency.
Circumstantial evidence.
Clandestine HUMINT.
Clandestine cell system.
Classified information.
Computer worm.
Confirmation bias.
Conspiracy theory.
Counter-insurgency.
Counter-terrorism.
Counterintelligence.
Counterterrorism Center.
Covert operation.
Cryptanalysis.
Cryptography.
Cyber threat intelligence.
Cyber-attack.
Demagogue.
Denial and deception.
Denial-of-service attack.
Deterrence theory.
Director of Central Intelligence.
Director of National Intelligence.
Director of the Central Intelligence Agency.
Disinformation.
Double agent.
Drug lord.
Electoral fraud.
Encryption.
Espionage.
Fabricator (intelligence).
Fake Claims.
Generative Adversarial Networks.
Hacking tool.
Identity theft.
Imminent Threat.
Information asymmetry.
Information overload.
Information warfare.
Insider threat.
Insurgency.
Intelligence Authorization Act.
Intelligence Reform and Terrorism Prevention Act.
Intelligence agency.
Intelligence analysis.
Intelligence officer.
Iran–Contra affair.
Jihadism.
KGB.
Lie detection.
MafiaBoy.
Malware.
Mole (espionage).
Mossad.
NSA warrantless surveillance (2001–07).
National Security Archive.
National security.
Nuclear warfare.
On Intelligence.
Osama bin Laden.
Palmer Raids.
Persecution.
Policy.
Political corruption.
Political crime.
Political repression.
Rogue state.
Sabotage.
Sanctions against Iran.
Secret Intelligence Service.
Security agency.
Sensitive Compartmented Information.
Smuggling.
Spy fiction.
Spycatcher.
Spymaster.
State secrets privilege.
Stuxnet.
Subversion.
Targeted killing.
Terrorism.
The Shadow Factory.
Theft.
Think Secret.
Top Secret America.
Trade secret.
Undercover operation.
United States Intelligence Community.
United States State Department list of Foreign Terrorist Organizations.
Vulnerability (computing).
Warfare.
Watergate scandal.
Weapon of mass destruction.
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English 9783110993899
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 9783110994810 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2022 English 9783110994513
Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2022 9783110994407 ZDB-23-PLW
Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2022 9783110749731
https://doi.org/10.1515/9780691223087?locatt=mode:legacy
https://www.degruyter.com/isbn/9780691223087
Cover https://www.degruyter.com/document/cover/isbn/9780691223087/original
language English
format eBook
author Zegart, Amy B.,
Zegart, Amy B.,
spellingShingle Zegart, Amy B.,
Zegart, Amy B.,
Spies, Lies, and Algorithms : The History and Future of American Intelligence /
Frontmatter --
Contents --
Tables --
Figures --
Abbreviations and Acronyms --
1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets --
2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy --
3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones --
4 Intelligence Basics: Knowns and Unknowns --
5 Why Analysis Is So Hard: The Seven Deadly Biases --
6 Counterintelligence: To Catch A Spy --
7 Covert Action “A Har d Business of Agonizing Choices” --
8 Congressional Oversight: Eyes on Spies --
9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World --
10 Decoding Cyber Threats --
Acknowledgments --
Notes --
Selected Reading --
Index
author_facet Zegart, Amy B.,
Zegart, Amy B.,
author_variant a b z ab abz
a b z ab abz
author_role VerfasserIn
VerfasserIn
author_sort Zegart, Amy B.,
title Spies, Lies, and Algorithms : The History and Future of American Intelligence /
title_sub The History and Future of American Intelligence /
title_full Spies, Lies, and Algorithms : The History and Future of American Intelligence / Amy B. Zegart.
title_fullStr Spies, Lies, and Algorithms : The History and Future of American Intelligence / Amy B. Zegart.
title_full_unstemmed Spies, Lies, and Algorithms : The History and Future of American Intelligence / Amy B. Zegart.
title_auth Spies, Lies, and Algorithms : The History and Future of American Intelligence /
title_alt Frontmatter --
Contents --
Tables --
Figures --
Abbreviations and Acronyms --
1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets --
2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy --
3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones --
4 Intelligence Basics: Knowns and Unknowns --
5 Why Analysis Is So Hard: The Seven Deadly Biases --
6 Counterintelligence: To Catch A Spy --
7 Covert Action “A Har d Business of Agonizing Choices” --
8 Congressional Oversight: Eyes on Spies --
9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World --
10 Decoding Cyber Threats --
Acknowledgments --
Notes --
Selected Reading --
Index
title_new Spies, Lies, and Algorithms :
title_sort spies, lies, and algorithms : the history and future of american intelligence /
publisher Princeton University Press,
publishDate 2022
physical 1 online resource (424 p.) : 11 b/w illus. 6 tables.
contents Frontmatter --
Contents --
Tables --
Figures --
Abbreviations and Acronyms --
1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets --
2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy --
3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones --
4 Intelligence Basics: Knowns and Unknowns --
5 Why Analysis Is So Hard: The Seven Deadly Biases --
6 Counterintelligence: To Catch A Spy --
7 Covert Action “A Har d Business of Agonizing Choices” --
8 Congressional Oversight: Eyes on Spies --
9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World --
10 Decoding Cyber Threats --
Acknowledgments --
Notes --
Selected Reading --
Index
isbn 9780691223087
9783110993899
9783110994810
9783110994513
9783110994407
9783110749731
callnumber-first J - Political Science
callnumber-subject JK - United States
callnumber-label JK468
callnumber-sort JK 3468 I6 Z418 42022
geographic_facet United States.
url https://doi.org/10.1515/9780691223087?locatt=mode:legacy
https://www.degruyter.com/isbn/9780691223087
https://www.degruyter.com/document/cover/isbn/9780691223087/original
illustrated Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 320 - Political science
dewey-ones 327 - International relations
dewey-full 327.1273
dewey-sort 3327.1273
dewey-raw 327.1273
dewey-search 327.1273
doi_str_mv 10.1515/9780691223087?locatt=mode:legacy
oclc_num 1301550170
work_keys_str_mv AT zegartamyb spiesliesandalgorithmsthehistoryandfutureofamericanintelligence
status_str n
ids_txt_mv (DE-B1597)600747
(OCoLC)1301550170
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022
Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2022 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE Political Science 2022
Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2022
is_hierarchy_title Spies, Lies, and Algorithms : The History and Future of American Intelligence /
container_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2022 English
_version_ 1770176323455549440
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09605nam a22019815i 4500</leader><controlfield tag="001">9780691223087</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230502090707.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230502t20222022nju fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1302166076</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780691223087</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9780691223087</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)600747</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1301550170</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">JK468.I6</subfield><subfield code="b">Z418 2022</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JK468.I6</subfield><subfield code="b">Z418 2022</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">327.1273</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Zegart, Amy B., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Spies, Lies, and Algorithms :</subfield><subfield code="b">The History and Future of American Intelligence /</subfield><subfield code="c">Amy B. Zegart.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (424 p.) :</subfield><subfield code="b">11 b/w illus. 6 tables.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Tables -- </subfield><subfield code="t">Figures -- </subfield><subfield code="t">Abbreviations and Acronyms -- </subfield><subfield code="t">1 Intelligence Challenges in the Digital Age: Cloaks, Daggers, and Tweets -- </subfield><subfield code="t">2 The Education Crisis: How Fictional Spies are Shaping Public Opinion and Intelligence Policy -- </subfield><subfield code="t">3 American Intelligence History at A Glance: From Fake Bakeries to Armed Drones -- </subfield><subfield code="t">4 Intelligence Basics: Knowns and Unknowns -- </subfield><subfield code="t">5 Why Analysis Is So Hard: The Seven Deadly Biases -- </subfield><subfield code="t">6 Counterintelligence: To Catch A Spy -- </subfield><subfield code="t">7 Covert Action “A Har d Business of Agonizing Choices” -- </subfield><subfield code="t">8 Congressional Oversight: Eyes on Spies -- </subfield><subfield code="t">9 Intelligence Isn’t Just For Governments Anymore: Nuclear Sleuthing in A Google Earth World -- </subfield><subfield code="t">10 Decoding Cyber Threats -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Selected Reading -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A fascinating and authoritative account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligence service</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public-private sector cooperation</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Security (National &amp; International).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Abuse of authority.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Al-Qaeda.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Assassination.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Atomic spies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bribery.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Bureau of Intelligence and Research.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CIA Counterintelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Central Intelligence Agency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Circumstantial evidence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Clandestine HUMINT.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Clandestine cell system.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Classified information.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer worm.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Confirmation bias.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Conspiracy theory.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counter-insurgency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counter-terrorism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counterintelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Counterterrorism Center.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Covert operation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptanalysis.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber threat intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber-attack.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Demagogue.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Denial and deception.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Denial-of-service attack.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Deterrence theory.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Director of Central Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Director of National Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Director of the Central Intelligence Agency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Disinformation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Double agent.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Drug lord.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electoral fraud.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Encryption.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Espionage.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fabricator (intelligence).</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fake Claims.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Generative Adversarial Networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking tool.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Identity theft.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Imminent Threat.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information asymmetry.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information overload.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Information warfare.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Insider threat.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Insurgency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence Authorization Act.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence Reform and Terrorism Prevention Act.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence agency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence analysis.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Intelligence officer.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Iran–Contra affair.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Jihadism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">KGB.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Lie detection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">MafiaBoy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Malware.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mole (espionage).</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mossad.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NSA warrantless surveillance (2001–07).</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">National Security Archive.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">National security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Nuclear warfare.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">On Intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Osama bin Laden.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Palmer Raids.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Persecution.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Policy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Political corruption.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Political crime.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Political repression.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Rogue state.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sabotage.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sanctions against Iran.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Secret Intelligence Service.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security agency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sensitive Compartmented Information.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Smuggling.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Spy fiction.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Spycatcher.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Spymaster.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">State secrets privilege.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Stuxnet.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Subversion.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Targeted killing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Terrorism.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">The Shadow Factory.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Theft.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Think Secret.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Top Secret America.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Trade secret.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Undercover operation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">United States Intelligence Community.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">United States State Department list of Foreign Terrorist Organizations.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Vulnerability (computing).</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Warfare.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Watergate scandal.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Weapon of mass destruction.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2022 English</subfield><subfield code="z">9783110993899</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2022</subfield><subfield code="z">9783110994810</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Political Science 2022 English</subfield><subfield code="z">9783110994513</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Political Science 2022</subfield><subfield code="z">9783110994407</subfield><subfield code="o">ZDB-23-PLW</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press Complete eBook-Package 2022</subfield><subfield code="z">9783110749731</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9780691223087?locatt=mode:legacy</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780691223087</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780691223087/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-074973-1 Princeton University Press Complete eBook-Package 2022</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-099389-9 EBOOK PACKAGE COMPLETE 2022 English</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-099451-3 EBOOK PACKAGE Political Science 2022 English</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2022</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-PLW</subfield><subfield code="b">2022</subfield></datafield></record></collection>