4422:, vol. 103, no. 1 (January/February 2024), pp. 150–156. "The dollar is one of the few currencies that almost all major banks will accept, and... the most widely used... As a result, the dollar is the currency that many companies must use... to do international business." (p. 150.) "ocal banks facilitating that trade... normally... buy U.S. dollars and then use dollars to buy . To do so, however, the banks must have access to the U.S. financial system and... follow rules laid out by Washington." (pp. 151–152.) "But there is another, lesser-known reason why the commands overwhelming economic power. Most of the world's
4348:, 2 September 2019, pp. 53–59. "There seems to be a paranoid paradox of espionage: the better your intelligence, the dumber your conduct; the more you know, the less you anticipate.... Hard-won information is ignored or wildly misinterpreted.... happens again and again a seeming national advance in intelligence is squandered through cross-bred confusion, political rivalry, mutual bureaucratic suspicions, intergovernmental competition, and fear of the press (as well as leaks to the press), all seasoned with dashes of sexual jealousy and adulterous intrigue." (p. 54.)
2643:
1808:
1501:(CIA) to coordinate intelligence and the National Security Agency for research into codes and electronic communication. In addition to these, the United States has 13 other intelligence gathering agencies; most of the U.S. expenditures for intelligence gathering are budgeted to various Defense Dept. agencies and their programs. Under the intelligence reorganization of 2004, the director of national intelligence is responsible for overseeing and coordinating the activities and budgets of the U.S. intelligence agencies.
2006:
6447:
2346:
56:
4475:
154–155.) Farrell and Newman, writes
Krugman, "are worried about the possibility of overreach. f the weaponizes the dollar against too many countries, they might... band together and adopt alternative methods of international payment. If countries become deeply worried about U.S. spying, they could lay fiber-optic cables that bypass the . And if Washington puts too many restrictions on American exports, foreign firms might turn away from U.S. technology." (p. 155.)
6456:
1379:
120:
2762:. This provides a mandatory death sentence if a person captured in the act is proven to be "lurking as a spy or acting as a spy in or about any place, vessel, or aircraft, within the control or jurisdiction of any of the armed forces, or in or about any shipyard, any manufacturing or industrial plant, or any other place or institution engaged in work in aid of the prosecution of the war by the United States, or elsewhere".
2593:. The BBC reported in 2012 on one such case, that of Mohammed Idrees, who was held under Indian police control for approximately 13 years for overstaying his 15-day visa by 2–3 days after seeing his ill parents in 1999. Much of the 13 years were spent in prison waiting for a hearing, and more time was spent homeless or living with generous families. The Indian
2224:: engages in clandestine activity for two intelligence or security services (or more in joint operations), who provides information about one or about each to the other, and who wittingly withholds significant information from one on the instructions of the other or is unwittingly manipulated by one so that significant facts are withheld from the adversary.
2626:
legally as "information of all sorts gathered by a government or organisation to guide its decisions. It includes information that may be both public and private, obtained from much different public or secret sources. It could consist entirely of information from either publicly available or secret sources, or be a combination of the two."
4625:
4454:
equipment to much of the planet giv China the power to eavesdrop on the rest of the world – just as the has done.... The learned that Huawei had been dealing surreptitiously with Iran – and therefore violating U.S. sanctions. Then, it... used its special access to information on international bank
2633:
There are also laws surrounding government and organisational intelligence and surveillance. Generally, the body involved should be issued with some form of warrant or permission from the government and should be enacting their procedures in the interest of protecting national security or the safety
2246:
usually has knowledge of both intelligence services and can identify operational techniques of both, thus making third-party recruitment difficult or impossible. The knowledge of operational techniques can also affect the relationship between the operations officer (or case officer) and the agent if
2115:
Many organizations, both national and non-national, conduct espionage operations. It should not be assumed that espionage is always directed at the most secret operations of a target country. National and terrorist organizations and other groups are also targeted. This is because governments want to
2232:, and others who work for themselves rather than a service are not double agents because they are not agents. The fact that double agents have an agent relationship with both sides distinguishes them from penetrations, who normally are placed with the target service in a staff or officer capacity."
2091:
an illegal agent, but is an ordinary citizen who is "relocated", for example, a "protected witness". Nevertheless, such a non-agent very likely will also have a case officer who will act as a controller. As in most, if not all synthetic identity schemes, for whatever purpose (illegal or legal), the
1768:
The US defines espionage towards itself as "the act of obtaining, delivering, transmitting, communicating, or receiving information about the national defence with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign
2713:
military operations while so disguised. Soldiers who are wearing enemy uniforms or civilian clothes simply for the sake of warmth along with other purposes rather than engaging in espionage or similar military operations while so attired are also excluded from being treated as unlawful combatants.
2629:
However, espionage and intelligence can be linked. According to the MI5 website, "foreign intelligence officers acting in the UK under diplomatic cover may enjoy immunity from prosecution. Such persons can only be tried for spying (or, indeed, any criminal offence) if diplomatic immunity is waived
2625:
Government intelligence is very much distinct from espionage, and is not illegal in the UK, providing that the organisations of individuals are registered, often with the ICO, and are acting within the restrictions of the
Regulation of Investigatory Powers Act (RIPA). 'Intelligence' is considered
2588:
As of 2012, India and
Pakistan were holding several hundred prisoners of each other's country for minor violations like trespass or visa overstay, often with accusations of espionage attached. Some of these include cases where Pakistan and India both deny citizenship to these people, leaving them
2095:
Spies may also be used to spread disinformation in the organization in which they are planted, such as giving false reports about their country's military movements, or about a competing company's ability to bring a product to market. Spies may be given other roles that also require infiltration,
4474:
that her company was not doing business with Iran. Canadian authorities, acting on a U.S. request, arrested her... in
December 2018. After... almost three years under house arrest... Meng... was allowed to return to China... But by the prospects for Chinese dominance of 5G had vanished..." (pp.
2686:
addresses the status of wartime spies, specifically within "Laws and
Customs of War on Land" (Hague IV); October 18, 1907: CHAPTER II Spies". Article 29 states that a person is considered a spy who, acts clandestinely or on false pretences, infiltrates enemy lines with the intention of acquiring
2241:
Unwitting double agent: offers or is forced to recruit as a double or redoubled agent and in the process is recruited by either a third-party intelligence service or his own government without the knowledge of the intended target intelligence service or the agent. This can be useful in capturing
2712:
distinguishes between a disguised spy and a disguised escaper. It is permissible for these groups to wear enemy uniforms or civilian clothes in order to facilitate their escape back to friendly lines so long as they do not attack enemy forces, collect military intelligence, or engage in similar
2695:
entitled to be treated as prisoners of war upon capture by the enemy. Article 30 states that a spy captured behind enemy lines may only be punished following a trial. However, Article 31 provides that if a spy successfully rejoined his own military and is then captured by the enemy as a lawful
2056:. Often the players have never met. Case officers are stationed in foreign countries to recruit and supervise intelligence agents, who in turn spy on targets in the countries where they are assigned. A spy need not be a citizen of the target country and hence does not automatically commit
2634:
of public citizens. Those carrying out intelligence missions should act within not only RIPA but also the Data
Protection Act and Human Rights Act. However, there are spy equipment laws and legal requirements around intelligence methods that vary for each form of intelligence enacted.
1673:
Espionage agents are usually trained experts in a targeted field so they can differentiate mundane information from targets of value to their own organizational development. Correct identification of the target at its execution is the sole purpose of the espionage operation.
3733:
2204:, "Economic Analysts may use their specialized skills to analyze and interpret economic trends and developments, assess and track foreign financial activities, and develop new econometric and modelling methodologies." This may also include information of trade or tariff.
2938:
highlights the adventurous life of U.S. Colonel Sidney
Forrester Mashbir, who during the 1920s and 1930s attempted to prevent war with Japan, and when war did erupt, he became General MacArthur's top advisor in the Pacific Theater of World War Two.
2617:, which repealed prior Official Secrets Acts and creates three separate offences for espionage. A person is liable to be imprisoned for life for committing an offence under Section 1 of the Act, or 14 years for an offence under Sections 2 and 3
2825:, a natural consequence of the secrecy inherent in their work. To fill in the blanks, the popular conception of the secret agent has been formed largely by 20th and 21st-century fiction and film. Attractive and sociable real-life agents such as
2123:, and also a great vulnerability when the adversary has sophisticated SIGINT detection and interception capability. Spies rely on COVCOM or covert communication through technically advanced spy devices. Agents must also transfer money securely.
2820:
During the many 20th-century spy scandals, much information became publicly known about national spy agencies and dozens of real-life secret agents. These sensational stories piqued public interest in a profession largely off-limits to
3741:
3331:
Ein neuer Typ des Spions War Daniel Defoe (1650-1731), der Autor des weltberĂĽhmten Romans "Robinson Crusoe" ... Zudem verfaĂźte Defoe eine
Theorie der Spionage, in der er der Regierung die Spitzelmethoden des Polizeistaates
2060:
when operating within it. While the more common practice is to recruit a person already trusted with access to sensitive information, sometimes a person with a well-prepared synthetic identity (cover background), called a
1745:
patrols and from diplomats, etc., are not considered espionage. Espionage is the disclosure of sensitive information (classified) to people who are not cleared for that information or access to that sensitive information.
2103:
Many governments spy on their allies as well as their enemies, although they typically maintain a policy of not commenting on this. Governments also employ private companies to collect information on their behalf such as
2700:
against their own country or co-belligerents of that country and may be captured and prosecuted at any place or any time regardless whether he rejoined the military to which he belongs or not or during or after the war.
2658:
In war, espionage is considered permissible as many nations recognize the inevitability of opposing sides seeking intelligence each about the dispositions of the other. To make the mission easier and successful,
1699:
intelligence (offensive, defensive, manoeuvre, naval, air, space). Agents are trained by military espionage education facilities and posted to an area of operation with covert identities to minimize prosecution
1693:
Strategic economic strengths (production, research, manufacture, infrastructure). Agents recruited from science and technology academia, commercial enterprises, and more rarely from among military technologists
2153:
In espionage jargon, an "agent" is the person who does the spying. They may be a citizen of a country recruited by that country to spy on another; a citizen of a country recruited by that country to carry out
2557:(at that time the Act had much stricter guidelines and amongst other things banned speech against military recruiting). The law was later used to suppress publication of periodicals, for example of
3671:
2411:. The risks of espionage vary. A spy violating the host country's laws may be deported, imprisoned, or even executed. A spy violating its own country's laws can be imprisoned for espionage or/and
2719:
are treated as spies as they too wear disguises behind enemy lines for the purpose of waging destruction on an enemy's vital targets in addition to intelligence gathering. For example, during
1717:
Although the news media may speak of "spy satellites" and the like, espionage is not a synonym for all intelligence-gathering disciplines. It is a specific form of human source intelligence (
2667:
to conceal their true identity from the enemy while penetrating enemy lines for intelligence gathering. However, if they are caught behind enemy lines in disguises, they are not entitled to
1148:
Espionage is often part of an institutional effort by a government or commercial concern. However, the term tends to be associated with state spying on potential or actual enemies for
3564:
1690:
towards domestic and foreign policies (popular, middle class, elites). Agents often recruited from field journalistic crews, exchange postgraduate students and sociology researchers
2415:(which in the United States and some other jurisdictions can only occur if they take up arms or aids the enemy against their own country during wartime), or even executed, as the
1753:, espionage usually involves accessing the place where the desired information is stored or accessing the people who know the information and will divulge it through some kind of
1684:: strategic production identification and assessment (food, energy, materials). Agents are usually found among bureaucrats who administer these resources in their own countries
2833:
hero operating outside the everyday constraints of society. Loner spy personalities may have been a stereotype of convenience for authors who already knew how to write loner
2158:
assignments disrupting his own country; a citizen of one country who is recruited by a second country to spy on or work against his own country or a third country, and more.
3651:
3635:
3073:
4134:
3895:"Convention (IV) respecting the Laws and Customs of War on Land and its annex: Regulations concerning the Laws and Customs of War on Land. The Hague, 18 October 1907"
3608:
2696:
combatant, he cannot be punished for his previous acts of espionage and must be treated as a prisoner of war. This provision does not apply to citizens who committed
1414:
had elaborate civilian espionage systems and all national military establishments had intelligence units. In order to protect the country against foreign agents, the
1163:
One way to gather data and information about a targeted organization is by infiltrating its ranks. Spies can then return information such as the size and strength of
5301:
1564:, U.S. cryptographers, in 1960, and Harold (Kim) Philby of Great Britain in 1962. U.S. acknowledgment of its U-2 flights and the exchange of Francis Gary Powers for
5514:
3463:
New Rules for
Victims of Armed Conflicts: Commentary on the Two 1977 Protocols Additional to the Geneva Conventions of 1949 (Nijhoff Classics in International Law)
5065:
2851:
is the most commercially successful of the many spy characters created by intelligence insiders during that struggle. Other fictional agents include Le Carré's
2324:
and does not report to a local station. A nonofficial cover operative can be dubbed an "illegal" when working in another country without diplomatic protection.
2247:
the case is transferred by an operational targeting officer] to a new operations officer, leaving the new officer vulnerable to attack. This type of transfer
2445:
and taken to the airport. Ames' wife was threatened with life imprisonment if her husband did not cooperate; he did, and she was given a five-year sentence.
1524:
over the Soviet Union for the CIA, was shot down and captured. During the Cold War, many Soviet intelligence officials defected to the West, including Gen.
5311:
3988:
2449:, a CIA officer in China, spent nineteen years in a Chinese prison for espionage—and died there—as he was operating without diplomatic cover and immunity.
3668:
2731:
thanks to two German agents betraying the mission to the U.S. Under the Hague
Convention of 1907, these Germans were classified as spies and tried by a
1183:
have strict laws concerning espionage, including those who practice espionage in other countries, and the penalties for being caught are often severe.
3865:
3373:
2691:
during times of war. Soldiers who penetrate enemy lines in proper uniforms for the purpose of acquiring intelligence are not considered spies but are
1705:
operations targeting opponent's intelligence services themselves, such as breaching the confidentiality of communications and recruiting defectors or
4164:
3512:
4438:
to analyze the data. As a result, the can monitor almost all international communication." (p. 154) This has allowed the U.S. "to effectively cut
3844:
2431:
to his KGB-officer "handler", the KGB "rolled up" several networks, and at least ten people were secretly shot. When Ames was arrested by the U.S.
4583:
3765:
3542:
1309:
freely. In 1481 the Council of Ten barred all Venetian government officials from making contact with ambassadors or foreigners. Those revealing
4426:, which carry data and messages around the planet, travel through the United States." (p. 152.) "he U.S. government has installed 'splitters':
2356:
66:
2009:
An intelligence officer's clothing, accessories, and behavior must be as unremarkable as possible—their lives (and others') may depend on it.
3568:
1497:(Committee for State Security), which also acted as a secret police force. In the United States, the 1947 National Security Act created the
5444:
5108:
4430:
that divide the beams of light carrying information into two streams. One... goes on to the intended recipients, ... the other goes to the
3115:
Fischbacher-Smith, D., 2011. "The enemy has passed through the gate: Insider threats, the dark triad, and the challenges around security".
2553:
Espionage laws are also used to prosecute non-spies. In the United States, the Espionage Act of 1917 was used against socialist politician
3971:"United States of America, Practice Relating to Rule 62. Improper Use of Flags or Military Emblems, Insignia or Uniforms of the Adversary"
5091:
5058:
4963:
3894:
3053:
2791:
2267:
and perform a specific set of tasks or functions while living undercover in an area of interest. This type of agent is not the same as a
1718:
1638:
4105:
3063:
1855:
1750:
1171:
within the organization and influence them to provide further information or to defect. In times of crisis, spies steal technology and
5507:
5148:
3591:
2752:
1637:
Intelligence services value certain intelligence collection techniques over others. The former Soviet Union, for example, preferred
6369:
3974:
3898:
2866:
Jumping on the spy bandwagon, other writers also started writing about spy fiction featuring female spies as protagonists, such as
3425:
2452:
In United States law, treason, espionage, and spying are separate crimes. Treason and espionage have graduated punishment levels.
2317:
3931:
Charlesworth, Lorie (2006). "2 SAS Regiment, War Crimes Investigations, and British Intelligence: Intelligence Officials and the
1737:) are all intelligence gathering disciplines, but none of them is considered espionage. Many HUMINT activities, such as prisoner
1466:
worked against Nazi Germany and provided the Allied secret services with information that was very important for the war effort.
1426:, who obtained information for Germany by seducing French officials, was the most noted espionage agent of World War I. Prior to
5547:
5336:
5306:
5051:
4946:
4902:
3655:
3028:
1081:
3632:
5562:
5489:
4487:
4366:
4195:
4089:
4023:
3405:
2594:
2519:
4131:
3529:
2271:, who continually contacts a case officer to file intelligence reports. A sleeper agent is not in contact with anyone until
7189:
5138:
4897:
3612:
2014:
2829:
find little employment in serious fiction, however. The fictional secret agent is more often a loner, sometimes amoral—an
2145:
companies are estimated to be losing about €50 billion ($ 87 billion) and 30,000 jobs to industrial espionage every year.
4652:
4405:
4311:
2893:
2743:
at the District of Columbia jail. Two who had given evidence against the others had their sentences reduced by President
2704:
The ones that are excluded from being treated as spies while behind enemy lines are escaping prisoners of war and downed
2510:
In modern times, many people convicted of espionage have been given penal sentences rather than execution. For example,
1574:
has a very cost-effective intelligence program that is especially effective in monitoring neighboring countries such as
5082:
2499:
From ancient times, the penalty for espionage in many countries was execution. This was true right up until the era of
2109:
1780:
1726:
1446:. However, the British system was the keystone of Allied intelligence. Numerous resistance groups such as the Austrian
4798:
4508:
Honorable Treachery: A History of U.S. Intelligence, Espionage, Covert Action from the American Revolution to the CIA
4060:
3998:
3317:
3287:
2390:
1348:(died 1731) not only spied for the British government, but also developed a theory of espionage foreshadowing modern
100:
3487:
2116:
retrieve information that they can use to be proactive in protecting their nation from potential terrorist attacks.
7046:
6968:
5439:
5431:
4833:
4758:
4431:
2759:
1792:
717:
481:
2727:, a sabotage mission against U.S. economic targets. Two weeks later, all were arrested in civilian clothes by the
2299:: provides misleading information to an enemy intelligence service or attempts to discredit the operations of the
2185:: instigates trouble or provides information to gather as many people as possible into one location for an arrest.
7194:
5449:
4571:
2973:
2915:
2887:
2432:
6131:
5380:
5205:
5120:
4700:
4446:
programs in exchange for relief." (pp. 153–154.) " few years ago, American officials... were in a panic about
4289:
2988:
2776:
Spies have long been favorite topics for novelists and filmmakers. An early example of espionage literature is
953:
206:
3134:
1775:(1990) defines espionage as: "... gathering, transmitting, or losing ... information related to the
5074:
3713:"USA v. Robert Philip Hanssen: Affidavit in Support of Criminal Complaint, Arrest Warrant and Search Warrant"
3058:
2739:
On August 3, 1942, all eight were found guilty and sentenced to death. Five days later, six were executed by
963:
43:
7041:
6336:
476:
6362:
4554:
4442:
out of the world financial system... Iran's economy stagnated... Eventually, Tehran agreed to cut back its
3873:
3370:
2921:
1796:
1795:. The United States, like most nations, conducts espionage against other nations, under the control of the
1529:
1439:
1038:
947:
7164:
7149:
4172:
5497:
3687:
3466:
3048:
3023:
2978:
2523:
2424:
2077:
1839:
1498:
1277:
and detailed record keeping. Western espionage changed fundamentally during the Renaissance when Italian
3841:
6733:
6472:
6291:
5717:
5540:
4468:
4048:
3769:
3421:
2814:
2630:
beforehand. Those officers operating without diplomatic cover have no such immunity from prosecution".
2614:
2468:
1587:
1533:
1074:
637:
285:
31:
4376:
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
6266:
6116:
4299:
3783:
2514:
is an American CIA analyst, turned KGB mole, who was convicted of espionage in 1994; he is serving a
2321:
2229:
1819:. The reason given is: What about the Defense Department, and the Director of National Intelligence?.
1771:
931:
4404:, "The American Way of Economic war: Is Washington Overusing Its Most Powerful Weapons?" (review of
4334:
America's Secret War: Inside the Hidden Worldwide Struggle Between the United States and Its Enemies
2242:
important information from an agent that is attempting to seek allegiance with another country. The
2052:
In larger networks, the organization can be complex with many methods to avoid detection, including
5855:
5825:
5412:
5143:
2683:
2598:
2464:
2372:
1734:
1642:
1368:
978:
201:
82:
2872:, which has more graphic action and sex, as compared to other novels featuring male protagonists.
2541:. So far as it is known, Ames compromised the second-largest number of CIA agents, second only to
6848:
6355:
5464:
5454:
5402:
5133:
4783:
4753:
4645:
4456:
3043:
2189:
2053:
1882:
1557:
1110:
796:
7154:
6958:
6948:
6571:
6446:
6209:
6141:
5966:
5880:
5820:
5479:
5417:
5397:
5346:
5103:
4558:, vol. LXXI, no. 2 (8 February 2024), pp. 32, 34–35. "n Walton's view, there was scarcely a US
2808:
2105:
1344:
1532–1590) was appointed foreign secretary and intelligence chief. The novelist and journalist
968:
707:
697:
383:
232:
181:
134:
17:
3970:
2601:
both decried his treatment. The BBC attributed some of the problems to tensions caused by the
1586:. Smaller countries can also mount effective and focused espionage efforts. For instance, the
6943:
6708:
6204:
5915:
5533:
5366:
5032:
3068:
3033:
2909:
2868:
2803:
2744:
2476:
2408:
2120:
2030:
1983:
1658:
1419:
1149:
1134:
1130:
1067:
988:
692:
612:
4113:
4052:
7036:
6953:
6938:
6834:
6020:
5742:
5469:
5407:
5293:
5249:
5234:
5183:
5128:
4958:
4941:
4914:
4677:
4562:
that was a long-term strategic success, with the possible exception of intervention in the
3018:
2834:
2822:
2692:
2651:
2642:
2570:
2526:
2446:
2307:
2214:
needed to further an intelligence service agenda. The use of the media to print a story to
2163:
2132:
2018:
1988:
1730:
1650:
1646:
1549:
1192:
1157:
782:
702:
687:
471:
39:
3588:
3426:"Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms"
3208:"Roman and Pontic Intelligence Strategies: Politics and War in the Time of Mithradates VI"
2238:: forced to mislead the foreign intelligence service after being caught as a double agent.
2049:
is a refuge for spies. Spies often seek to obtain secret information from another source.
1516:
and the Rosenberg Case. In 1952 the Communist Chinese captured two CIA agents and in 1960
8:
7126:
6502:
6390:
5925:
5875:
5845:
5815:
5737:
5702:
5502:
5376:
5193:
5020:
4924:
4371:
2931:
depicts a pair of none-too-bright men sent to the Soviet Union to investigate a missile.
2724:
2647:
2582:
2507:
was a Nazi spy who parachuted into Great Britain in 1941 and was executed for espionage.
2484:
2436:
2197:
1963:
1887:
1867:
1702:
1696:
1517:
1478:
1356:
1318:
1176:
926:
314:
266:
196:
186:
3254:
2581:, as well as officials who communicated with journalists for innocuous reasons, such as
2013:
A spy is a person employed to seek out top secret information from a source. Within the
1821:
Please help update this article to reflect recent events or newly available information.
1197:
Espionage has been recognized as of importance in military affairs since ancient times.
7184:
7051:
7031:
6996:
6986:
6606:
6587:
6517:
6426:
6296:
6048:
5865:
5797:
5767:
5612:
5602:
5474:
5459:
5351:
5326:
5264:
5215:
5200:
4909:
4876:
4850:
4828:
4823:
4793:
4778:
4638:
4423:
4260:
3952:
3917:
3914:
Crime Wars: The Global Intersection of Crime, Political Violence, and International Law
3809:
3432:
3235:
3227:
3188:
2844:
2511:
2472:
2290:
2207:
2038:
1948:
1933:
1908:
1872:
1776:
1662:
1627:
1615:
1561:
1541:
1513:
1443:
1337:
1314:
1030:
847:
837:
486:
466:
418:
399:
329:
226:
7199:
7056:
6894:
6547:
6512:
6248:
6035:
5850:
5587:
5316:
5025:
4694:
4563:
4522:
Hidden Secrets: A Complete History of Espionage and the Technology Used to Support It
4483:
4409:
4391:
4362:
4264:
4252:
4223:
4191:
4085:
4056:
4019:
3994:
3956:
3401:
3313:
3283:
3239:
3180:
2955:
2709:
2441:
2196:
gathering, this may include gathering information of a corporate business venture or
2182:
1521:
1451:
1372:
1227:
1137:, as it is by definition unwelcome. In some circumstances, it may be a legal tool of
1009:
983:
868:
491:
359:
324:
3712:
1179:
is the practice of thwarting enemy espionage and intelligence-gathering. Almost all
7112:
6820:
6758:
6653:
6321:
6281:
6146:
6076:
5972:
5920:
5890:
5667:
5642:
5371:
5321:
4990:
4722:
4559:
4244:
4081:
4041:
3948:
3944:
3219:
3172:
2983:
2732:
2602:
2480:
2364:
2235:
1706:
1681:
1525:
958:
916:
911:
768:
662:
557:
252:
74:
2620:
2218:
a foreign service into action, exposing their operations while under surveillance.
7086:
7012:
6688:
6594:
6492:
6421:
6286:
6276:
6228:
6199:
6184:
6136:
6091:
6015:
5946:
5930:
5787:
5747:
5259:
5188:
5010:
4985:
4919:
4881:
4818:
4590:
4443:
4418:
4138:
3848:
3675:
3639:
3595:
3377:
3307:
3008:
2783:
2748:
2736:
2668:
2558:
2296:
2072:
These agents can be moles (who are recruited before they get access to secrets),
1938:
1788:
1784:
1611:
1435:
1364:
1310:
1180:
1138:
1121:. Any individual or spy ring (a cooperating group of spies), in the service of a
1106:
902:
592:
521:
447:
406:
304:
242:
172:
157:
6238:
4545:
2076:(who are recruited after they get access to secrets and leave their country) or
2005:
1645:, while the United States has tended to emphasize technological methods such as
1375:
was America's first spymaster, utilizing espionage tactics against the British.
7096:
7091:
7061:
6885:
6577:
6431:
6311:
6121:
6106:
6058:
5997:
5988:
5961:
5840:
5835:
5782:
5762:
5632:
5356:
5176:
4688:
4550:
Spying Through a Glass Darkly: The Ethics of Espionage and Counter-Intelligence
4427:
4344:
3911:
3393:
3345:
3003:
2830:
2740:
2578:
2554:
2542:
2488:
2460:
2368:
2328:
2215:
2034:
1943:
1862:
1762:
1742:
1687:
1537:
1482:
1447:
1383:
1294:
1286:
1247:
1223:
1205:
1200:
The oldest known classified document was a report made by a spy disguised as a
1014:
972:
531:
526:
496:
389:
78:
1568:
in 1962 implied the legitimacy of some espionage as an arm of foreign policy.
7178:
6830:
6728:
6532:
6482:
6326:
6271:
6243:
6233:
6189:
6111:
6101:
6005:
5956:
5910:
5905:
5885:
5757:
5732:
5722:
5682:
5652:
5647:
5617:
5274:
5254:
5239:
4968:
4936:
4838:
4813:
4732:
4256:
3830:
3223:
3184:
3038:
3013:
2998:
2927:
2860:
2852:
2840:
2826:
2590:
2574:
2566:
2515:
2260:
2026:
1973:
1928:
1738:
1722:
1455:
1415:
1411:
1274:
1231:
1209:
1201:
778:
632:
344:
294:
4609:
Spies, Lies, and Algorithms: The History and Future of American Intelligence
4227:
3852:
2907:
Espionage has also made its way into comedy depictions. The 1960s TV series
7136:
7071:
6678:
6567:
6552:
6331:
6306:
6194:
6151:
6126:
6081:
6063:
5951:
5870:
5860:
5810:
5772:
5712:
5707:
5692:
5687:
5677:
5672:
5662:
5592:
5525:
5361:
5279:
5269:
5210:
5015:
4803:
4788:
4727:
4712:
4705:
4567:
4460:
4401:
4283:(2nd ed. 2018); focus on the 21st century; reprints 30 essays by scholars.
3303:
2951:
2881:
2856:
2799:
2720:
2562:
2534:
2504:
2500:
2428:
2420:
2311:
2293:
information that can help lead to recruitment into an intelligence service.
2278:
2221:
2022:
1978:
1918:
1892:
1877:
1486:
1470:
1431:
1427:
1349:
1345:
1322:
1302:
1253:
1019:
582:
506:
379:
364:
276:
127:
7159:
5043:
4360:
Surveillance Tradecraft: The Professional's Guide to Surveillance Training
4235:
Winkler, Jonathan Reed (July 2009). "Information Warfare in World War I".
2459:
passed the Espionage Act of 1917. Over the years, many spies, such as the
2210:: provides political influence in an area of interest, possibly including
6842:
6838:
6748:
6497:
6411:
6316:
6301:
6156:
6096:
6086:
6010:
5830:
5805:
5777:
5752:
5727:
5657:
5627:
5597:
5171:
5005:
4871:
4717:
4435:
4381:
4339:
2778:
2771:
2688:
2672:
2456:
1758:
1591:
1565:
1545:
1407:
1403:
1360:
1326:
1266:
1258:
1164:
1153:
1034:
790:
786:
652:
309:
238:
162:
4501:
Knowing One's Enemies: Intelligence Assessment Before the Two World Wars
4284:
3851:, Rupa Jha, October 21, 2012, BBC (retrieved 2012-10-20) (Program link:
3231:
3207:
3176:
1473:, the activity of espionage has enlarged, much of it growing out of the
7131:
6917:
6800:
6795:
6673:
6557:
6537:
6527:
6507:
6461:
6436:
6406:
6043:
6025:
5900:
5895:
5637:
5622:
5607:
5244:
5000:
4980:
4973:
4953:
4860:
4464:
4396:
The Second Oldest Profession: Spies and Spying in the Twentieth Century
4248:
4078:
International Law in Historical Perspective: The laws of war. Part IX-A
2898:
2876:
2848:
2787:
2416:
2404:
2211:
2155:
2066:
2046:
1958:
1913:
1902:
1851:
1509:
1282:
1278:
1262:
1122:
1055:
941:
893:
748:
743:
577:
369:
349:
339:
319:
271:
191:
144:
3192:
3160:
7101:
7081:
7066:
7001:
6907:
6873:
6863:
6825:
6763:
6743:
6683:
6658:
6053:
5697:
5582:
5225:
5220:
4995:
4808:
4737:
4386:
Intelligence in War: Knowledge of the Enemy from Napoleon to Al-Qaeda
3312:(in German) (2 ed.). Munich: Koehler & Amelang. p. 38.
2993:
2786:, with a description of the training of an intelligence agent in the
2676:
2660:
2331:
for an established network of agents, usually considered "blue chip".
2289:
Access agent: provides access to other potential agents by providing
2073:
1897:
1754:
1631:
1553:
1463:
1423:
1391:
1378:
1168:
883:
852:
821:
811:
773:
667:
647:
587:
562:
536:
516:
501:
6455:
4602:
The Rise and Fall of Intelligence: An International Security History
3784:"Robert Hanssen, F.B.I. Agent Exposed as Spy for Moscow, Dies at 79"
2251:
occur when an officer has completed his term of service or when his
7021:
6991:
6912:
6858:
6810:
6785:
6767:
6703:
6668:
6639:
6621:
6616:
6599:
6562:
6542:
6179:
5577:
5229:
4843:
3098:
2947:
2716:
2664:
2529:
officer and analyst who committed espionage against his country by
2097:
2045:
who do not know the agent or case officer but transfer messages. A
1968:
1953:
1923:
1575:
1505:
1474:
1298:
1172:
1004:
936:
888:
842:
806:
758:
733:
671:
607:
572:
456:
433:
428:
411:
374:
354:
151:
1212:
had a developed secret service, and espionage is mentioned in the
1133:, or independent operation, can commit espionage. The practice is
7121:
6963:
6929:
6899:
6868:
6815:
6790:
6738:
6718:
6713:
6693:
6663:
6626:
6611:
6522:
6487:
6347:
4929:
4612:
3543:
Beijing's spies cost German firms billions, says espionage expert
2697:
2412:
2225:
2142:
2057:
2042:
1490:
1306:
1237:
The thesis that espionage and intelligence has a central role in
1126:
921:
873:
816:
763:
738:
712:
642:
622:
617:
597:
567:
438:
423:
334:
299:
261:
119:
1614:, was particularly feared by Iranian dissidents before the 1979
1367:
achieved their fame as spies, and there was considerable use of
7026:
6853:
6723:
6582:
6416:
6171:
4575:
4447:
4151:
Spyscreen: Espionage on Film and TV from the 1930s to the 1960s
3117:
Journal of Organizational Effectiveness: People and Performance
2943:
2795:
2723:, eight German agents entered the U.S. in June 1942 as part of
2705:
2621:
Government intelligence laws and its distinction from espionage
2538:
2530:
2138:
1665:) officers were judged by the number of agents they recruited.
1579:
1544:. Among Western officials who defected to the Soviet Union are
1459:
1290:
1270:
1261:
European states excelled at what has later been termed counter-
801:
627:
461:
394:
222:
3691:
2942:
Black Widow is also a fictional agent who was introduced as a
2813:
written in 1821, about an American spy in New York during the
6753:
6698:
6648:
6379:
6220:
2545:, who also served a prison sentence until his death in 2023.
1607:
1603:
1595:
1583:
1571:
1242:
1219:
1214:
1142:
657:
602:
552:
65:
deal primarily with the United States and do not represent a
4630:
4540:
Shaw, Tamsin, "Ethical Espionage" (review of Calder Walton,
4414:
Underground Empire: How America Weaponized the World Economy
3912:
Paul Battersby; Joseph M. Siracusa; Sasho Ripiloski (2011).
3351:. Intelligence Resource Program, Central Intelligence Agency
2407:
of many nations. In the United States, it is covered by the
38:"Spy" and "Secret agent" redirect here. For other uses, see
7076:
6805:
4515:
Calculations: net assessment and the coming of World War II
4471:
4439:
4219:
3074:
Spying on United Nations leaders by United States diplomats
2758:
The U.S. codification of enemy spies is Article 106 of the
2565:. In the early 21st century, the act was used to prosecute
1599:
1317:. Venice became obsessed with espionage because successful
1024:
753:
511:
2747:
to prison terms. In 1948, they were released by President
2161:
In popular usage, this term is sometimes confused with an
2041:), supports and directs the human collector. Cut-outs are
4528:
A Century of Spies: Intelligence in the Twentieth Century
4043:
Romantics at War: Glory and Guilt in the Age of Terrorism
3726:
3102:
2968:
2925:
film trilogy portrays an inept spy, while the 1985 movie
2837:
characters that sold well from the 1920s to the present.
2728:
1757:. There are exceptions to physical meetings, such as the
1654:
1494:
1238:
4128:
Neutral Ground: A Political History of Espionage Fiction
3420:
2950:. She later became an agent of the fictional spy agency
2306:
Facilities agent: provides access to buildings, such as
1765:
in never meeting the people who bought his information.
1489:
have had a long tradition of espionage ranging from the
5515:
Counterintelligence and counter-terrorism organizations
4451:
2687:
intelligence about the enemy and communicate it to the
2518:
without the possibility of parole in the high-security
1273:. Inquisitions were marked by centrally organised mass
4542:
Spies: The Epic Intelligence War Between East and West
1677:
Broad areas of espionage targeting expertise include:
4353:
In Spies, We Trust: The Story of Western Intelligence
4342:, "Spy vs. Spy vs. Spy: How valuable is espionage?",
3548:
2435:(FBI), he faced life in prison; his contact, who had
1838:
Britain's espionage activities are controlled by the
6451:
4494:
Encyclopedia of Espionage, Intelligence and Security
3609:"CIA Status Improves Contractor's Case for Immunity"
2285:
Less common or lesser known forms of agent include:
1733:), and analysis of publicly available data sources (
2119:Communications both are necessary to espionage and
2069:, may attempt to infiltrate a target organization.
27:
Clandestine acquisition of confidential information
4279:Aldrich, Richard J., and Christopher Andrew, eds.
4040:
4038:
4016:The Contemporary Law Of Armed Conflict 2nd Edition
2843:achieved popularity as a fictional agent of early
2491:, and others have been prosecuted under this law.
2192:through the use of special privileges. If used in
1779:". Espionage is a violation of United States law,
1590:had consistently superior intelligence during the
1438:established elaborate espionage nets. In 1942 the
4513:Murray, Williamson, and Allan Reed Millett, eds.
4478:Lerner, Brenda Wilmoth & K. Lee Lerner, eds.
3530:Defectors say China running 1,000 spies in Canada
1369:spies on both sides during the American Civil War
7176:
4492:Lerner, K. Lee and Brenda Wilmoth Lerner, eds.
4075:
2403:Espionage against a nation is a crime under the
4584:Encyclopedia of the Central Intelligence Agency
4313:Intelligence Literature: Suggested Reading List
4013:
3734:"Aldrich Hazen Ames Register Number: 40087-083"
1321:demanded that the city-state could protect its
1113:). A person who commits espionage is called an
3801:
3460:
6363:
5541:
5059:
4646:
4496:(2003), worldwide recent coverage 1100 pages.
4378:, 1996 revised edition. First published 1967.
4327:A Short Course in the Secret War, 4th Edition
3205:
2353:The examples and perspective in this article
1394:and spy, with her chauffeur Boris Wolkowski (
1230:, when spies employed illiterate subjects in
1075:
63:The examples and perspective in this article
5555:
4463:(... the founder's daughter), had committed
3930:
3557:
3545:". The Sydney Morning Herald. July 25, 2009.
2494:
1845:
1606:, have highly developed operations as well.
5073:
4552:, Oxford University Press, 251 pp., 2024),
4294:The Secret World: A History of Intelligence
3740:. Federal Bureau of Prisons. Archived from
3456:
3454:
3452:
3280:The Secret World: A History of Intelligence
3054:Human intelligence (intelligence gathering)
2646:Painting of French spy captured during the
2608:
1293:became so obsessed with espionage that the
6370:
6356:
5548:
5534:
5066:
5052:
4653:
4639:
4570:) and perhaps support for the anti-Soviet
4216:The Evolution of British Sigint, 1653–1939
3064:List of intelligence gathering disciplines
2178:Among the most common forms of agent are:
1856:List of intelligence gathering disciplines
1712:
1082:
1068:
4544:, Simon and Schuster, 2023, 672 pp.; and
4039:George P. Fletcher (September 16, 2002).
2613:Espionage is illegal in the UK under the
2391:Learn how and when to remove this message
101:Learn how and when to remove this message
5166:
4672:
3975:International Committee of the Red Cross
3899:International Committee of the Red Cross
3807:
3449:
3302:
3158:
2641:
2548:
2281:: works for three intelligence services.
2092:assistance of a controller is required.
2004:
1377:
5480:Scientific & Technical intelligence
4234:
4213:
3705:
3680:
3582:
3392:
3252:
2954:and a member of the superhero team the
2188:Intelligence agent: provides access to
2126:
2087:is also employed for an individual who
1668:
1653:. In the Soviet Union, both political (
14:
7177:
4903:Chinese espionage in the United States
4566:(a disastrous military fiasco for the
4018:. Juris Publishing, Inc. p. 142.
3690:. John Young Architect. Archived from
3482:
3480:
3478:
3476:
3371:"China's spying seeks secret US info."
3277:
3029:Chinese espionage in the United States
2148:
1729:), aircraft or satellite photography (
1402:In the 20th century, at the height of
1297:, which was nominally responsible for
1226:. Espionage was also prevalent in the
6351:
5529:
5047:
4634:
4450:... which... seemed poised to supply
3513:"Cyber Espionage to Combat Terrorism"
3206:Ă‘aco del Hoyo, Toni (November 2014).
3129:
3127:
3125:
1289:to collect intelligence. Renaissance
5302:By alliances, nations and industries
4898:Chinese intelligence activity abroad
4480:Terrorism: essential primary sources
4185:
4162:
3278:Andrew, Christopher (28 June 2018).
2946:spy, an antagonist of the superhero
2339:
2015:United States Intelligence Community
1801:
1594:. Some Islamic countries, including
49:
4964:Interpersonal (HUMINT) intelligence
4329:. Madison Books, November 19, 2001.
3937:The Journal of Intelligence History
3611:. New America Media. Archived from
3473:
2423:handed a stack of dossiers of U.S.
2080:(who get access but do not leave).
1751:intelligence collection disciplines
1522:flying a U-2 reconnaissance mission
24:
6377:
4272:
3461:Igor Primoratz (August 15, 2013).
3122:
2595:People's Union for Civil Liberties
2110:International Intelligence Limited
1536:, Peter Deriabin, Pawel Monat and
1477:between the United States and the
1208:, who died in around 1750 BC. The
1105:is the act of obtaining secret or
25:
7211:
4799:Computer and network surveillance
4626:History of an espionage in Russia
4619:
3688:"Aldrich Ames Criminal Complaint"
3343:
2753:American Zone of occupied Germany
2320:: lives in another country under
2175:who recruits and handles agents.
6969:Perverting the course of justice
6454:
6445:
6393:. Not all types are listed here.
4834:Short-range agent communications
4153:(Oxford University Press, 2003).
2879:world as well, in games such as
2760:Uniform Code of Military Justice
2344:
2327:Principal agent: functions as a
1806:
1793:Uniform Code of Military Justice
718:Perverting the course of justice
118:
54:
6709:Intellectual property violation
5450:Words of estimative probability
5312:Operational platforms by nation
4535:The U.S. Intelligence Community
4467:by falsely telling the British
4434:, which then uses high-powered
4355:(2013), covers U.S. and Britain
4237:The Journal of Military History
4179:
4156:
4143:
4120:
4098:
4069:
4032:
4007:
3981:
3963:
3924:
3905:
3887:
3858:
3835:
3823:
3776:
3758:
3662:
3644:
3626:
3601:
3535:
3522:
3505:
3414:
3386:
3363:
3346:"Intelligence in the Civil War"
2974:Federal Bureau of Investigation
2916:Agent 000 and the Deadly Curves
2433:Federal Bureau of Investigation
2000:
1626:Today, spy agencies target the
1331:
613:Intellectual property violation
4416:, Henry Holt, 2023, 288 pp.),
4207:
3949:10.1080/16161262.2006.10555131
3337:
3296:
3271:
3246:
3199:
3152:
3109:
3091:
2989:Cover (intelligence gathering)
2875:Spy fiction has permeated the
2765:
2522:. Ames was formerly a 31-year
13:
1:
4660:
4611:(2022), university textbook.
4281:Secret Intelligence: A Reader
3990:2006 Operational Law Handbook
3808:Gerstein, Josh (2011-03-07).
3598:Mi5.gov. "How spies operate".
3080:
3059:List of intelligence agencies
2823:human interest news reporting
1621:
1341:
44:Secret agent (disambiguation)
6292:Vladimir Mikhaylovich Petrov
4597:, New York, Macmillan, 1962.
4555:The New York Review of Books
4106:"UCMJ – Article 106 – Spies"
3810:"Obama's hard line on leaks"
3085:
1797:National Clandestine Service
1440:Office of Strategic Services
1371:. Though not a spy himself,
948:Ignorantia juris non excusat
7:
7190:Law enforcement occupations
5498:Intelligence cycle security
3842:Your World: The Nowhere Man
3532:". CBC News. June 15, 2005.
3467:Martinus Nijhoff Publishers
3255:"Espionage in Ancient Rome"
3049:History of Soviet espionage
3024:American espionage in China
2979:Central Intelligence Agency
2961:
2802:. An even earlier work was
2520:Allenwood U.S. Penitentiary
2425:Central Intelligence Agency
2367:, discuss the issue on the
2141:is losing $ 12 billion and
1840:Secret Intelligence Service
1610:, the secret police of the
1508:, espionage cases included
1499:Central Intelligence Agency
1175:the enemy in various ways.
1152:purposes. Spying involving
77:, discuss the issue on the
10:
7216:
6734:Possessing stolen property
5718:Julius and Ethel Rosenberg
4469:financial services company
4300:Burnham, Frederick Russell
4049:Princeton University Press
3918:Greenwood Publishing Group
3870:MI5 - the Security Service
2769:
2615:National Security Act 2023
2314:operations, resupply, etc.
2130:
2021:" is more common usage. A
1849:
1552:of Great Britain in 1951,
1269:were staged to annihilate
1190:
1186:
638:Possessing stolen property
286:Offense against the person
36:
32:Espionage (disambiguation)
29:
7146:
7111:
7011:
6978:
6927:
6883:
6777:
6637:
6471:
6443:
6399:
6386:
6267:Alexander Gregory Barmine
6257:
6218:
6169:
6072:
6034:
5996:
5986:
5939:
5796:
5570:
5561:
5488:
5430:
5390:
5335:
5292:
5157:
5119:
5099:
5090:
5081:
4890:
4859:
4769:
4746:
4668:
4165:"The Emperor and the Spy"
4076:J. H. W. Verziji (1978).
3674:December 3, 2012, at the
3638:December 3, 2012, at the
3567:. cia.gov. Archived from
3282:. Penguin Books Limited.
3161:"Spies in Ancient Greece"
2675:and punishment—including
2495:History of espionage laws
1846:Technology and techniques
1815:This article needs to be
1634:as well as state actors.
1556:of West Germany in 1954,
1301:, did not even allow the
1141:and in others, it may be
932:Diminished responsibility
726:Crimes against the public
6833:(such as prohibition of
5826:Thomas Patrick Cavanaugh
5556:Soviet and Russian spies
4432:National Security Agency
4351:Jeffreys-Jones, Rhodri.
4014:Leslie C. Green (2000).
3594:January 6, 2011, at the
3492:International Spy Museum
3422:US Department of Defense
3224:10.1177/0968344513505528
3159:Richmond, J. A. (1998).
3139:International Spy Museum
2913:, the 1983 Finnish film
2782:by the English novelist
2684:Hague Convention of 1907
2609:Espionage laws in the UK
2599:Human Rights Law Network
2419:were. For example, when
2054:clandestine cell systems
1791:and Article 106a of the
1741:, reports from military
1643:research in open sources
1107:confidential information
861:Crimes against the state
781:(such as prohibition of
5465:Intelligence assessment
5455:All-source intelligence
5075:Intelligence management
4784:Covert listening device
4754:Intelligence assessment
4595:The Zimmermann Telegram
4533:Richelson, Jeffery T.
4526:Richelson, Jeffery T.
4499:May, Ernest R. (ed.).
4457:chief financial officer
4190:. Horizon Productions.
4188:The Emperor and the Spy
4169:TheEmperorAndTheSpy.com
3488:"Language of Espionage"
3044:Intelligence assessment
2936:The Emperor and the Spy
1883:Covert listening device
1761:, or the insistence of
1713:Methods and terminology
1485:and its successor, the
1145:and punishable by law.
545:Crimes against property
235:(also called violation)
7195:Positions of authority
6949:Miscarriage of justice
6142:John Alexander Symonds
5967:Harold James Nicholson
5821:Christopher John Boyce
5149:Operational techniques
5104:Special reconnaissance
4537:(1999, fourth edition)
4214:Johnson, John (1997).
4186:Katz, Stan S. (2019).
4163:Katz, Stan S. (2019).
3253:ehoward (2006-06-12).
2671:status and subject to
2655:
2637:
2335:
2194:corporate intelligence
2169:intelligence operative
2121:clandestine operations
2106:SCG International Risk
2010:
1772:Black's Law Dictionary
1749:Unlike other forms of
1399:
1305:to consult government
1245:was first advanced in
1103:intelligence gathering
997:Other common-law areas
830:Crimes against animals
698:Miscarriage of justice
680:Crimes against justice
6944:Malfeasance in office
6389:Note: Crimes vary by
6205:Stephen Joseph Ratkai
5033:Targeted surveillance
4581:Smith, W. Thomas Jr.
4110:About.com US Military
3768:. FBI. Archived from
3376:May 19, 2011, at the
3069:Military intelligence
3034:Clandestine operation
2934:The historical novel
2804:James Fenimore Cooper
2745:Franklin D. Roosevelt
2645:
2549:Use against non-spies
2477:Robert Philip Hanssen
2455:The United States in
2409:Espionage Act of 1917
2202:economic intelligence
2190:sensitive information
2008:
1984:Surveillance aircraft
1659:military intelligence
1588:Vietnamese communists
1420:Espionage Act of 1917
1381:
1167:. They can also find
1131:criminal organization
903:Defenses to liability
693:Malfeasance in office
7037:Cybersex trafficking
6801:Censorship violation
5743:Nadezhda Ulanovskaya
5470:Medical intelligence
5440:Competing hypotheses
5250:Industrial espionage
5235:Denial and deception
4959:Industrial espionage
4759:competing hypotheses
4309:Felix, Christopher
3866:"What is espionage?"
3766:"Aldrich Hazen Ames"
3369:Arrillaga, Pauline.
3119:, 2(2), pp. 134–156.
3019:Undercover operation
2894:No One Lives Forever
2835:private investigator
2751:and deported to the
2652:Alphonse de Neuville
2571:Thomas Andrews Drake
2447:Hugh Francis Redmond
2427:(CIA) agents in the
2373:create a new article
2365:improve this article
2355:may not represent a
2310:or offices used for
2269:deep cover operative
2164:intelligence officer
2133:Industrial espionage
2127:Industrial espionage
1989:Surveillance balloon
1669:Targets of espionage
1450:-Messner Group, the
1442:was founded by Gen.
1193:History of espionage
1158:industrial espionage
749:Censorship violation
472:Cybersex trafficking
83:create a new article
75:improve this article
40:Spy (disambiguation)
30:For other uses, see
6831:Illegal consumption
6503:Criminal negligence
5926:John Anthony Walker
5876:Clayton J. Lonetree
5816:David Sheldon Boone
5738:Alexander Ulanovsky
5703:William Ward Pigman
5503:Counterintelligence
5418:Technical (TECHINT)
5413:Open-source (OSINT)
5403:Geospatial (GEOINT)
5377:Casualty estimation
4591:Tuchman, Barbara W.
4572:Solidarity movement
4290:Andrew, Christopher
3829:See the article on
3658:on 3 December 2012.
3398:Inside the Aquarium
3309:Verschlusssache BND
2725:Operation Pastorius
2648:Franco-Prussian War
2583:Stephen Jin-Woo Kim
2527:counterintelligence
2485:John Anthony Walker
2437:diplomatic immunity
2149:Agents in espionage
1964:Side channel attack
1868:Biographic leverage
1703:Counterintelligence
1697:Military capability
1518:Francis Gary Powers
1357:American Revolution
1319:international trade
1281:installed resident
1177:Counterintelligence
927:Defense of property
779:Illegal consumption
315:Criminal negligence
215:Severity of offense
7032:Child sexual abuse
6997:Wildlife smuggling
6987:Cruelty to animals
6778:Against the public
6607:Negligent homicide
6518:False imprisonment
6473:Against the person
6297:Fyodor Raskolnikov
6132:Michael John Smith
5866:Andrew Daulton Lee
5856:Robert Lee Johnson
5768:Harry Dexter White
5603:Whittaker Chambers
5475:Military geography
5460:Basic intelligence
5398:Financial (FININT)
5339:signature (MASINT)
5265:One-way voice link
5201:Concealment device
4910:Cold War espionage
4877:Front organization
4851:Surveillance tools
4829:Phone surveillance
4824:One-way voice link
4779:Concealment device
4482:Thomas Gale 2006
4424:fiber-optic cables
4392:Knightley, Phillip
4332:Friedman, George.
4249:10.1353/jmh.0.0324
4137:2019-03-27 at the
3847:2019-09-15 at the
3788:The New York Times
3242:– via JSTOR.
2845:Cold War espionage
2806:'s classic novel,
2656:
2512:Aldrich Hazen Ames
2473:Aldrich Hazen Ames
2469:the Rosenberg ring
2465:Robert Lee Johnson
2291:offender profiling
2208:Agent-of-influence
2078:defectors in place
2039:non-official cover
2011:
1949:One-way voice link
1934:Non-official cover
1909:Front organisation
1873:Concealment device
1628:illegal drug trade
1616:Iranian Revolution
1562:Bernon F. Mitchell
1514:Whittaker Chambers
1444:William J. Donovan
1400:
1338:Francis Walsingham
848:Wildlife smuggling
838:Cruelty to animals
467:Child sexual abuse
419:Negligent homicide
330:False imprisonment
227:Indictable offense
171:Scope of criminal
7172:
7171:
7155:Wikimedia Commons
7113:Inchoate offenses
7057:Indecent exposure
6548:Human trafficking
6513:Domestic violence
6345:
6344:
6165:
6164:
6036:Portland spy ring
5982:
5981:
5851:Edward Lee Howard
5588:Elizabeth Bentley
5523:
5522:
5426:
5425:
5317:Direction finding
5307:In modern history
5288:
5287:
5041:
5040:
4695:Agent provocateur
4600:Warner, Michael.
4564:Soviet-Afghan War
4506:O'Toole, George.
4488:978-1-4144-0621-3
4455:data to that 's
4367:978-0-9535378-2-2
4197:978-0-9903349-4-1
4091:978-90-286-0148-2
4025:978-1-929446-03-2
3407:978-0-425-09474-7
3177:10.1093/gr/45.1.1
3165:Greece & Rome
3135:"Espionage Facts"
2815:Revolutionary War
2733:military tribunal
2710:international law
2693:lawful combatants
2442:persona non grata
2401:
2400:
2393:
2375:, as appropriate.
2322:false credentials
2183:Agent provocateur
2031:diplomatic status
1939:Numbers messaging
1836:
1835:
1721:). Codebreaking (
1688:Popular sentiment
1682:Natural resources
1558:William H. Martin
1550:Donald D. Maclean
1530:Victor Kravchenko
1469:Since the end of
1452:French Resistance
1373:George Washington
1228:Greco-Roman world
1210:ancient Egyptians
1092:
1091:
492:Indecent exposure
360:Human trafficking
325:Domestic violence
253:Inchoate offenses
111:
110:
103:
85:, as appropriate.
16:(Redirected from
7207:
6821:Ethnic cleansing
6759:Trespass to land
6654:Arms trafficking
6464:
6459:
6458:
6449:
6372:
6365:
6358:
6349:
6348:
6337:Stig Wennerström
6282:Walter Krivitsky
6147:Edith Tudor-Hart
6077:Michael Bettaney
5994:
5993:
5973:Illegals Program
5921:George Trofimoff
5891:Earl Edwin Pitts
5668:William Malisoff
5643:David Greenglass
5571:1940s and before
5568:
5567:
5550:
5543:
5536:
5527:
5526:
5322:Traffic analysis
5294:Signals (SIGINT)
5129:Asset recruiting
5097:
5096:
5088:
5087:
5068:
5061:
5054:
5045:
5044:
4655:
4648:
4641:
4632:
4631:
4358:Jenkins, Peter.
4325:
4323:
4321:
4268:
4231:
4202:
4201:
4183:
4177:
4176:
4171:. Archived from
4160:
4154:
4147:
4141:
4126:Brett F. Woods,
4124:
4118:
4117:
4112:. Archived from
4102:
4096:
4095:
4082:Brill Publishers
4073:
4067:
4066:
4046:
4036:
4030:
4029:
4011:
4005:
4004:
3985:
3979:
3978:
3967:
3961:
3960:
3933:Natzweiler Trial
3928:
3922:
3921:
3909:
3903:
3902:
3891:
3885:
3884:
3882:
3881:
3872:. Archived from
3862:
3856:
3839:
3833:
3827:
3821:
3820:
3818:
3817:
3805:
3799:
3798:
3796:
3794:
3780:
3774:
3773:
3762:
3756:
3752:
3750:
3749:
3730:
3724:
3723:
3721:
3720:
3709:
3703:
3702:
3700:
3699:
3684:
3678:
3666:
3660:
3659:
3654:. Archived from
3648:
3642:
3630:
3624:
3623:
3621:
3620:
3605:
3599:
3586:
3580:
3579:
3577:
3576:
3561:
3555:
3552:
3546:
3539:
3533:
3526:
3520:
3519:
3517:
3509:
3503:
3502:
3500:
3498:
3484:
3471:
3470:
3458:
3447:
3446:
3444:
3443:
3437:
3431:. Archived from
3430:
3418:
3412:
3411:
3390:
3384:
3367:
3361:
3360:
3358:
3356:
3350:
3341:
3335:
3334:
3328:
3326:
3300:
3294:
3293:
3275:
3269:
3268:
3266:
3265:
3250:
3244:
3243:
3203:
3197:
3196:
3156:
3150:
3149:
3147:
3145:
3131:
3120:
3113:
3107:
3106:
3095:
2984:Covert operation
2798:in 19th century
2603:Kashmir conflict
2481:Jonathan Pollard
2396:
2389:
2385:
2382:
2376:
2348:
2347:
2340:
2303:in an operation.
1831:
1828:
1822:
1810:
1809:
1802:
1777:national defense
1526:Walter Krivitsky
1343:
1335:
1334: 1558–1603
1333:
1311:official secrets
1204:in the court of
1202:diplomatic envoy
1181:sovereign states
1084:
1077:
1070:
1041:
912:Actual innocence
769:Ethnic cleansing
663:Trespass to land
558:Arms trafficking
122:
115:
114:
106:
99:
95:
92:
86:
58:
57:
50:
47:
21:
7215:
7214:
7210:
7209:
7208:
7206:
7205:
7204:
7175:
7174:
7173:
7168:
7142:
7141:
7140:
7107:
7106:
7105:
7087:Sex trafficking
7013:Sexual offenses
7007:
7006:
7005:
6979:Against animals
6974:
6973:
6972:
6923:
6922:
6921:
6879:
6878:
6877:
6773:
6772:
6771:
6689:False pretenses
6633:
6632:
6631:
6595:Preterintention
6467:
6460:
6453:
6450:
6441:
6395:
6382:
6376:
6346:
6341:
6287:Kerttu Nuorteva
6277:Dieter Gerhardt
6259:
6253:
6229:Hirohide Ishida
6214:
6200:Gerda Munsinger
6185:Jeffrey Delisle
6161:
6137:Dave Springhall
6092:Litzi Friedmann
6068:
6030:
6016:John Cairncross
5978:
5947:Evgeny Buryakov
5935:
5931:Jerry Whitworth
5916:Robert Thompson
5792:
5788:Anatoli Yatskov
5748:Julian Wadleigh
5557:
5554:
5524:
5519:
5484:
5422:
5408:Imagery (IMINT)
5386:
5347:Electro-optical
5338:
5337:Measurement and
5331:
5284:
5260:Numbers station
5189:Black operation
5153:
5115:
5077:
5072:
5042:
5037:
5011:Sting operation
4920:Black operation
4886:
4882:Limited hangout
4864:
4855:
4819:Numbers station
4771:
4765:
4742:
4682:
4664:
4659:
4622:
4617:
4607:Zegart, Amy B.
4419:Foreign Affairs
4398:, Norton, 1986.
4319:
4317:
4310:
4275:
4273:Further reading
4210:
4205:
4198:
4184:
4180:
4161:
4157:
4148:
4144:
4139:Wayback Machine
4125:
4121:
4104:
4103:
4099:
4092:
4084:. p. 143.
4074:
4070:
4063:
4037:
4033:
4026:
4012:
4008:
4001:
3993:. DIANE. 2010.
3987:
3986:
3982:
3969:
3968:
3964:
3929:
3925:
3910:
3906:
3893:
3892:
3888:
3879:
3877:
3864:
3863:
3859:
3853:The Nowhere Man
3849:Wayback Machine
3840:
3836:
3828:
3824:
3815:
3813:
3806:
3802:
3792:
3790:
3782:
3781:
3777:
3764:
3763:
3759:
3754:(Search result)
3747:
3745:
3732:
3731:
3727:
3718:
3716:
3711:
3710:
3706:
3697:
3695:
3686:
3685:
3681:
3676:Wayback Machine
3667:
3663:
3650:
3649:
3645:
3640:Wayback Machine
3631:
3627:
3618:
3616:
3607:
3606:
3602:
3596:Wayback Machine
3587:
3583:
3574:
3572:
3563:
3562:
3558:
3553:
3549:
3540:
3536:
3527:
3523:
3515:
3511:
3510:
3506:
3496:
3494:
3486:
3485:
3474:
3459:
3450:
3441:
3439:
3435:
3428:
3419:
3415:
3408:
3394:Suvorov, Victor
3391:
3387:
3378:Wayback Machine
3368:
3364:
3354:
3352:
3348:
3344:Allen, Thomas.
3342:
3338:
3324:
3322:
3320:
3301:
3297:
3290:
3276:
3272:
3263:
3261:
3251:
3247:
3204:
3200:
3157:
3153:
3143:
3141:
3133:
3132:
3123:
3114:
3110:
3097:
3096:
3092:
3088:
3083:
3078:
3009:Secret identity
2964:
2784:Rudyard Kipling
2774:
2768:
2749:Harry S. Truman
2737:Washington D.C.
2669:prisoner-of-war
2640:
2623:
2611:
2559:Father Coughlin
2551:
2503:; for example,
2497:
2439:, was declared
2397:
2386:
2380:
2377:
2362:
2349:
2345:
2338:
2297:Confusion agent
2263:: recruited to
2236:Redoubled agent
2198:stock portfolio
2151:
2135:
2129:
2029:, who may have
2003:
1993:
1858:
1848:
1832:
1826:
1823:
1820:
1811:
1807:
1715:
1671:
1624:
1612:Pahlavi dynasty
1534:Vladimir Petrov
1462:and the Polish
1365:Benedict Arnold
1330:
1313:could face the
1195:
1189:
1139:law enforcement
1115:espionage agent
1088:
1029:
593:False pretenses
522:Sex trafficking
448:Sexual offenses
407:Preterintention
243:Summary offense
107:
96:
90:
87:
72:
59:
55:
48:
37:
35:
28:
23:
22:
15:
12:
11:
5:
7213:
7203:
7202:
7197:
7192:
7187:
7170:
7169:
7167:
7162:
7157:
7152:
7147:
7144:
7143:
7139:
7134:
7129:
7124:
7119:
7118:
7117:
7115:
7109:
7108:
7104:
7099:
7097:Sexual slavery
7094:
7092:Sexual assault
7089:
7084:
7079:
7074:
7069:
7064:
7059:
7054:
7049:
7044:
7039:
7034:
7029:
7024:
7019:
7018:
7017:
7015:
7009:
7008:
7004:
6999:
6994:
6989:
6984:
6983:
6982:
6980:
6976:
6975:
6971:
6966:
6961:
6956:
6951:
6946:
6941:
6936:
6935:
6934:
6932:
6925:
6924:
6920:
6915:
6910:
6905:
6902:
6897:
6892:
6891:
6890:
6888:
6881:
6880:
6876:
6871:
6866:
6861:
6856:
6851:
6846:
6828:
6823:
6818:
6816:Hostage-taking
6813:
6808:
6803:
6798:
6793:
6788:
6783:
6782:
6781:
6779:
6775:
6774:
6770:
6761:
6756:
6751:
6746:
6741:
6736:
6731:
6726:
6721:
6716:
6711:
6706:
6701:
6696:
6691:
6686:
6681:
6676:
6671:
6666:
6661:
6656:
6651:
6646:
6645:
6644:
6642:
6635:
6634:
6630:
6629:
6624:
6619:
6614:
6609:
6604:
6603:
6602:
6592:
6591:
6590:
6580:
6575:
6565:
6560:
6555:
6550:
6545:
6540:
6535:
6530:
6525:
6520:
6515:
6510:
6505:
6500:
6495:
6490:
6485:
6479:
6478:
6477:
6475:
6469:
6468:
6466:
6465:
6444:
6442:
6440:
6439:
6434:
6429:
6424:
6419:
6414:
6409:
6403:
6401:
6397:
6396:
6387:
6384:
6383:
6375:
6374:
6367:
6360:
6352:
6343:
6342:
6340:
6339:
6334:
6329:
6324:
6319:
6314:
6312:Vitaly Shlykov
6309:
6304:
6299:
6294:
6289:
6284:
6279:
6274:
6269:
6263:
6261:
6260:in combination
6255:
6254:
6252:
6251:
6246:
6241:
6236:
6231:
6225:
6223:
6216:
6215:
6213:
6212:
6207:
6202:
6197:
6192:
6187:
6182:
6176:
6174:
6167:
6166:
6163:
6162:
6160:
6159:
6154:
6149:
6144:
6139:
6134:
6129:
6124:
6122:Geoffrey Prime
6119:
6114:
6109:
6107:Melita Norwood
6104:
6099:
6094:
6089:
6084:
6079:
6073:
6070:
6069:
6067:
6066:
6061:
6059:Harry Houghton
6056:
6051:
6046:
6040:
6038:
6032:
6031:
6029:
6028:
6023:
6021:Donald Maclean
6018:
6013:
6008:
6002:
6000:
5998:Cambridge Five
5991:
5984:
5983:
5980:
5979:
5977:
5976:
5969:
5964:
5962:Robert Hanssen
5959:
5954:
5949:
5943:
5941:
5937:
5936:
5934:
5933:
5928:
5923:
5918:
5913:
5908:
5903:
5898:
5893:
5888:
5883:
5881:Richard Miller
5878:
5873:
5868:
5863:
5858:
5853:
5848:
5846:Reino Häyhänen
5843:
5841:Robert Hanssen
5838:
5836:James Hall III
5833:
5828:
5823:
5818:
5813:
5808:
5802:
5800:
5794:
5793:
5791:
5790:
5785:
5783:Flora Wovschin
5780:
5775:
5770:
5765:
5763:Nathaniel Weyl
5760:
5755:
5750:
5745:
5740:
5735:
5730:
5725:
5720:
5715:
5710:
5705:
5700:
5695:
5690:
5685:
5680:
5675:
5670:
5665:
5660:
5655:
5650:
5645:
5640:
5635:
5633:Harold Glasser
5630:
5625:
5620:
5615:
5610:
5605:
5600:
5595:
5590:
5585:
5580:
5574:
5572:
5565:
5559:
5558:
5553:
5552:
5545:
5538:
5530:
5521:
5520:
5518:
5517:
5512:
5511:
5510:
5500:
5494:
5492:
5486:
5485:
5483:
5482:
5477:
5472:
5467:
5462:
5457:
5452:
5447:
5445:Target-centric
5442:
5436:
5434:
5428:
5427:
5424:
5423:
5421:
5420:
5415:
5410:
5405:
5400:
5394:
5392:
5388:
5387:
5385:
5384:
5374:
5369:
5367:Radiofrequency
5364:
5359:
5354:
5349:
5343:
5341:
5333:
5332:
5330:
5329:
5324:
5319:
5314:
5309:
5304:
5298:
5296:
5290:
5289:
5286:
5285:
5283:
5282:
5277:
5272:
5267:
5262:
5257:
5252:
5247:
5242:
5237:
5232:
5223:
5218:
5213:
5208:
5203:
5198:
5197:
5196:
5186:
5181:
5180:
5179:
5174:
5163:
5161:
5155:
5154:
5152:
5151:
5146:
5141:
5136:
5131:
5125:
5123:
5117:
5116:
5114:
5113:
5112:
5111:
5100:
5094:
5092:Human (HUMINT)
5085:
5079:
5078:
5071:
5070:
5063:
5056:
5048:
5039:
5038:
5036:
5035:
5030:
5029:
5028:
5023:
5013:
5008:
5003:
4998:
4993:
4988:
4983:
4978:
4977:
4976:
4971:
4961:
4956:
4951:
4950:
4949:
4944:
4934:
4933:
4932:
4927:
4917:
4912:
4907:
4906:
4905:
4894:
4892:
4888:
4887:
4885:
4884:
4879:
4874:
4868:
4866:
4857:
4856:
4854:
4853:
4848:
4847:
4846:
4836:
4831:
4826:
4821:
4816:
4811:
4806:
4801:
4796:
4791:
4786:
4781:
4775:
4773:
4772:communications
4767:
4766:
4764:
4763:
4762:
4761:
4750:
4748:
4744:
4743:
4741:
4740:
4735:
4730:
4725:
4720:
4715:
4710:
4709:
4708:
4698:
4691:
4689:Agent handling
4685:
4683:
4681:
4680:
4675:
4669:
4666:
4665:
4658:
4657:
4650:
4643:
4635:
4629:
4628:
4621:
4620:External links
4618:
4616:
4615:
4613:online reviews
4605:
4598:
4588:
4579:
4538:
4531:
4524:
4518:
4511:
4504:
4497:
4490:
4476:
4410:Abraham Newman
4399:
4389:
4379:
4369:
4356:
4349:
4345:The New Yorker
4337:
4330:
4307:
4304:Taking Chances
4297:
4287:
4276:
4274:
4271:
4270:
4269:
4243:(3): 845–867.
4232:
4209:
4206:
4204:
4203:
4196:
4178:
4175:on 2019-09-26.
4155:
4149:Miller, Toby,
4142:
4119:
4116:on 2013-05-15.
4097:
4090:
4068:
4061:
4031:
4024:
4006:
3999:
3980:
3962:
3923:
3920:. p. 125.
3904:
3886:
3857:
3834:
3822:
3812:. politico.com
3800:
3775:
3772:on 2010-10-13.
3757:
3725:
3704:
3679:
3661:
3643:
3625:
3600:
3581:
3565:"Double Agent"
3556:
3547:
3534:
3521:
3504:
3472:
3469:. p. 214.
3448:
3424:(2007-07-12).
3413:
3406:
3385:
3362:
3336:
3318:
3295:
3288:
3270:
3245:
3218:(4): 401–421.
3212:War in History
3198:
3151:
3121:
3108:
3089:
3087:
3084:
3082:
3079:
3077:
3076:
3071:
3066:
3061:
3056:
3051:
3046:
3041:
3036:
3031:
3026:
3021:
3016:
3011:
3006:
3004:Secret service
3001:
2996:
2991:
2986:
2981:
2976:
2971:
2965:
2963:
2960:
2922:Johnny English
2770:Main article:
2767:
2764:
2741:electric chair
2639:
2636:
2622:
2619:
2610:
2607:
2579:Edward Snowden
2567:whistleblowers
2555:Eugene V. Debs
2550:
2547:
2543:Robert Hanssen
2496:
2493:
2489:James Hall III
2461:Soble spy ring
2399:
2398:
2359:of the subject
2357:worldwide view
2352:
2350:
2343:
2337:
2334:
2333:
2332:
2325:
2315:
2304:
2294:
2283:
2282:
2276:
2258:
2257:
2256:
2239:
2219:
2205:
2186:
2150:
2147:
2131:Main article:
2128:
2125:
2035:official cover
2002:
1999:
1992:
1991:
1986:
1981:
1976:
1971:
1966:
1961:
1956:
1951:
1946:
1944:Official cover
1941:
1936:
1931:
1926:
1921:
1916:
1911:
1906:
1900:
1895:
1890:
1885:
1880:
1875:
1870:
1865:
1863:Agent handling
1859:
1847:
1844:
1834:
1833:
1814:
1812:
1805:
1781:18 U.S.C.
1763:Robert Hanssen
1743:reconnaissance
1714:
1711:
1710:
1709:
1700:
1694:
1691:
1685:
1670:
1667:
1623:
1620:
1538:Oleg Penkovsky
1483:Russian Empire
1436:Imperial Japan
1384:Minna Craucher
1325:. Under Queen
1295:Council of Ten
1287:capital cities
1275:interrogations
1265:when Catholic
1248:The Art of War
1232:civil services
1224:Amarna letters
1206:King Hammurabi
1191:Main article:
1188:
1185:
1090:
1089:
1087:
1086:
1079:
1072:
1064:
1061:
1060:
1059:
1058:
1050:
1049:
1045:
1044:
1043:
1042:
1027:
1022:
1017:
1012:
1007:
999:
998:
994:
993:
992:
991:
986:
981:
976:
966:
961:
956:
951:
944:
939:
934:
929:
924:
919:
914:
906:
905:
899:
898:
897:
896:
891:
886:
881:
876:
871:
863:
862:
858:
857:
856:
855:
850:
845:
840:
832:
831:
827:
826:
825:
824:
819:
814:
809:
804:
799:
794:
776:
771:
766:
764:Hostage-taking
761:
756:
751:
746:
741:
736:
728:
727:
723:
722:
721:
720:
715:
710:
705:
700:
695:
690:
682:
681:
677:
676:
675:
674:
665:
660:
655:
650:
645:
640:
635:
630:
625:
620:
615:
610:
605:
600:
595:
590:
585:
580:
575:
570:
565:
560:
555:
547:
546:
542:
541:
540:
539:
534:
532:Sexual slavery
529:
527:Sexual assault
524:
519:
514:
509:
504:
499:
494:
489:
484:
479:
474:
469:
464:
459:
451:
450:
444:
443:
442:
441:
436:
431:
426:
421:
416:
415:
414:
404:
403:
402:
392:
387:
377:
372:
367:
362:
357:
352:
347:
342:
337:
332:
327:
322:
317:
312:
307:
302:
297:
289:
288:
282:
281:
280:
279:
274:
269:
264:
256:
255:
249:
248:
247:
246:
236:
230:
217:
216:
212:
211:
210:
209:
204:
199:
194:
189:
184:
176:
175:
168:
167:
166:
165:
160:
155:
148:
138:
137:
131:
130:
124:
123:
109:
108:
69:of the subject
67:worldwide view
62:
60:
53:
26:
9:
6:
4:
3:
2:
7212:
7201:
7198:
7196:
7193:
7191:
7188:
7186:
7183:
7182:
7180:
7166:
7163:
7161:
7158:
7156:
7153:
7151:
7148:
7145:
7138:
7135:
7133:
7130:
7128:
7125:
7123:
7120:
7116:
7114:
7110:
7103:
7100:
7098:
7095:
7093:
7090:
7088:
7085:
7083:
7080:
7078:
7075:
7073:
7070:
7068:
7065:
7063:
7060:
7058:
7055:
7053:
7050:
7048:
7047:Homosexuality
7045:
7043:
7040:
7038:
7035:
7033:
7030:
7028:
7025:
7023:
7020:
7016:
7014:
7010:
7003:
7000:
6998:
6995:
6993:
6990:
6988:
6985:
6981:
6977:
6970:
6967:
6965:
6962:
6960:
6957:
6955:
6952:
6950:
6947:
6945:
6942:
6940:
6937:
6933:
6931:
6926:
6919:
6916:
6914:
6911:
6909:
6906:
6903:
6901:
6898:
6896:
6893:
6889:
6887:
6882:
6875:
6872:
6870:
6867:
6865:
6862:
6860:
6857:
6855:
6852:
6850:
6849:Miscegenation
6847:
6844:
6840:
6836:
6832:
6829:
6827:
6824:
6822:
6819:
6817:
6814:
6812:
6809:
6807:
6804:
6802:
6799:
6797:
6794:
6792:
6789:
6787:
6784:
6780:
6776:
6769:
6765:
6762:
6760:
6757:
6755:
6752:
6750:
6747:
6745:
6742:
6740:
6737:
6735:
6732:
6730:
6729:Pickpocketing
6727:
6725:
6722:
6720:
6717:
6715:
6712:
6710:
6707:
6705:
6702:
6700:
6697:
6695:
6692:
6690:
6687:
6685:
6682:
6680:
6677:
6675:
6672:
6670:
6667:
6665:
6662:
6660:
6657:
6655:
6652:
6650:
6647:
6643:
6641:
6636:
6628:
6625:
6623:
6620:
6618:
6615:
6613:
6610:
6608:
6605:
6601:
6598:
6597:
6596:
6593:
6589:
6586:
6585:
6584:
6581:
6579:
6576:
6573:
6569:
6566:
6564:
6561:
6559:
6556:
6554:
6551:
6549:
6546:
6544:
6541:
6539:
6536:
6534:
6533:Home invasion
6531:
6529:
6526:
6524:
6521:
6519:
6516:
6514:
6511:
6509:
6506:
6504:
6501:
6499:
6496:
6494:
6491:
6489:
6486:
6484:
6483:Assassination
6481:
6480:
6476:
6474:
6470:
6463:
6457:
6452:
6448:
6438:
6435:
6433:
6430:
6428:
6425:
6423:
6420:
6418:
6415:
6413:
6410:
6408:
6405:
6404:
6402:
6398:
6394:
6392:
6385:
6381:
6373:
6368:
6366:
6361:
6359:
6354:
6353:
6350:
6338:
6335:
6333:
6330:
6328:
6327:Richard Sorge
6325:
6323:
6322:Siddiq Ghouse
6320:
6318:
6315:
6313:
6310:
6308:
6305:
6303:
6300:
6298:
6295:
6293:
6290:
6288:
6285:
6283:
6280:
6278:
6275:
6273:
6272:Stig Bergling
6270:
6268:
6265:
6264:
6262:
6256:
6250:
6247:
6245:
6244:Hotsumi Ozaki
6242:
6240:
6237:
6235:
6234:Yotoku Miyagi
6232:
6230:
6227:
6226:
6224:
6222:
6217:
6211:
6208:
6206:
6203:
6201:
6198:
6196:
6193:
6191:
6190:Igor Gouzenko
6188:
6186:
6183:
6181:
6178:
6177:
6175:
6173:
6168:
6158:
6155:
6153:
6150:
6148:
6145:
6143:
6140:
6138:
6135:
6133:
6130:
6128:
6125:
6123:
6120:
6118:
6115:
6113:
6112:Alan Nunn May
6110:
6108:
6105:
6103:
6102:Percy Glading
6100:
6098:
6095:
6093:
6090:
6088:
6085:
6083:
6080:
6078:
6075:
6074:
6071:
6065:
6062:
6060:
6057:
6055:
6052:
6050:
6047:
6045:
6042:
6041:
6039:
6037:
6033:
6027:
6024:
6022:
6019:
6017:
6014:
6012:
6009:
6007:
6006:Anthony Blunt
6004:
6003:
6001:
5999:
5995:
5992:
5990:
5985:
5975:
5974:
5970:
5968:
5965:
5963:
5960:
5958:
5957:Peter Debbins
5955:
5953:
5950:
5948:
5945:
5944:
5942:
5938:
5932:
5929:
5927:
5924:
5922:
5919:
5917:
5914:
5912:
5911:Oscar Seborer
5909:
5907:
5906:Robert Soblen
5904:
5902:
5899:
5897:
5894:
5892:
5889:
5887:
5886:Ronald Pelton
5884:
5882:
5879:
5877:
5874:
5872:
5869:
5867:
5864:
5862:
5859:
5857:
5854:
5852:
5849:
5847:
5844:
5842:
5839:
5837:
5834:
5832:
5829:
5827:
5824:
5822:
5819:
5817:
5814:
5812:
5809:
5807:
5804:
5803:
5801:
5799:
5795:
5789:
5786:
5784:
5781:
5779:
5776:
5774:
5771:
5769:
5766:
5764:
5761:
5759:
5758:Bill Weisband
5756:
5754:
5751:
5749:
5746:
5744:
5741:
5739:
5736:
5734:
5733:Morton Sobell
5731:
5729:
5726:
5724:
5723:Alfred Sarant
5721:
5719:
5716:
5714:
5711:
5709:
5706:
5704:
5701:
5699:
5696:
5694:
5691:
5689:
5686:
5684:
5683:Isaiah Oggins
5681:
5679:
5676:
5674:
5671:
5669:
5666:
5664:
5661:
5659:
5656:
5654:
5653:John Herrmann
5651:
5649:
5648:Theodore Hall
5646:
5644:
5641:
5639:
5636:
5634:
5631:
5629:
5626:
5624:
5621:
5619:
5618:Judith Coplon
5616:
5614:
5611:
5609:
5606:
5604:
5601:
5599:
5596:
5594:
5591:
5589:
5586:
5584:
5581:
5579:
5576:
5575:
5573:
5569:
5566:
5564:
5560:
5551:
5546:
5544:
5539:
5537:
5532:
5531:
5528:
5516:
5513:
5509:
5508:organizations
5506:
5505:
5504:
5501:
5499:
5496:
5495:
5493:
5491:
5490:Dissemination
5487:
5481:
5478:
5476:
5473:
5471:
5468:
5466:
5463:
5461:
5458:
5456:
5453:
5451:
5448:
5446:
5443:
5441:
5438:
5437:
5435:
5433:
5429:
5419:
5416:
5414:
5411:
5409:
5406:
5404:
5401:
5399:
5396:
5395:
5393:
5389:
5382:
5378:
5375:
5373:
5370:
5368:
5365:
5363:
5360:
5358:
5355:
5353:
5350:
5348:
5345:
5344:
5342:
5340:
5334:
5328:
5325:
5323:
5320:
5318:
5315:
5313:
5310:
5308:
5305:
5303:
5300:
5299:
5297:
5295:
5291:
5281:
5278:
5276:
5275:Steganography
5273:
5271:
5268:
5266:
5263:
5261:
5258:
5256:
5255:Interrogation
5253:
5251:
5248:
5246:
5243:
5241:
5240:Eavesdropping
5238:
5236:
5233:
5231:
5227:
5224:
5222:
5219:
5217:
5214:
5212:
5209:
5207:
5204:
5202:
5199:
5195:
5192:
5191:
5190:
5187:
5185:
5182:
5178:
5175:
5173:
5170:
5169:
5168:
5165:
5164:
5162:
5160:
5156:
5150:
5147:
5145:
5144:Direct action
5142:
5140:
5139:Covert action
5137:
5135:
5132:
5130:
5127:
5126:
5124:
5122:
5118:
5110:
5109:organizations
5107:
5106:
5105:
5102:
5101:
5098:
5095:
5093:
5089:
5086:
5084:
5080:
5076:
5069:
5064:
5062:
5057:
5055:
5050:
5049:
5046:
5034:
5031:
5027:
5024:
5022:
5019:
5018:
5017:
5014:
5012:
5009:
5007:
5004:
5002:
4999:
4997:
4994:
4992:
4989:
4987:
4984:
4982:
4979:
4975:
4972:
4970:
4969:interrogation
4967:
4966:
4965:
4962:
4960:
4957:
4955:
4952:
4948:
4945:
4943:
4940:
4939:
4938:
4937:Eavesdropping
4935:
4931:
4928:
4926:
4923:
4922:
4921:
4918:
4916:
4913:
4911:
4908:
4904:
4901:
4900:
4899:
4896:
4895:
4893:
4889:
4883:
4880:
4878:
4875:
4873:
4870:
4869:
4867:
4862:
4858:
4852:
4849:
4845:
4842:
4841:
4840:
4839:Steganography
4837:
4835:
4832:
4830:
4827:
4825:
4822:
4820:
4817:
4815:
4814:Invisible ink
4812:
4810:
4807:
4805:
4802:
4800:
4797:
4795:
4792:
4790:
4787:
4785:
4782:
4780:
4777:
4776:
4774:
4768:
4760:
4757:
4756:
4755:
4752:
4751:
4749:
4745:
4739:
4736:
4734:
4733:Sleeper agent
4731:
4729:
4726:
4724:
4721:
4719:
4716:
4714:
4711:
4707:
4704:
4703:
4702:
4699:
4697:
4696:
4692:
4690:
4687:
4686:
4684:
4679:
4676:
4674:
4671:
4670:
4667:
4663:
4656:
4651:
4649:
4644:
4642:
4637:
4636:
4633:
4627:
4624:
4623:
4614:
4610:
4606:
4603:
4599:
4596:
4592:
4589:
4586:
4585:
4580:
4577:
4573:
4569:
4565:
4561:
4560:covert action
4557:
4556:
4551:
4547:
4543:
4539:
4536:
4532:
4529:
4525:
4523:
4520:Owen, David.
4519:
4516:
4512:
4509:
4505:
4502:
4498:
4495:
4491:
4489:
4485:
4481:
4477:
4473:
4470:
4466:
4462:
4458:
4453:
4449:
4445:
4441:
4437:
4433:
4429:
4425:
4421:
4420:
4415:
4411:
4407:
4406:Henry Farrell
4403:
4402:Krugman, Paul
4400:
4397:
4393:
4390:
4387:
4383:
4380:
4377:
4373:
4370:
4368:
4364:
4361:
4357:
4354:
4350:
4347:
4346:
4341:
4338:
4335:
4331:
4328:
4315:
4314:
4308:
4305:
4301:
4298:
4295:
4291:
4288:
4286:
4282:
4278:
4277:
4266:
4262:
4258:
4254:
4250:
4246:
4242:
4238:
4233:
4229:
4225:
4221:
4217:
4212:
4211:
4199:
4193:
4189:
4182:
4174:
4170:
4166:
4159:
4152:
4146:
4140:
4136:
4133:
4129:
4123:
4115:
4111:
4107:
4101:
4093:
4087:
4083:
4079:
4072:
4064:
4062:9780691006512
4058:
4054:
4050:
4045:
4044:
4035:
4027:
4021:
4017:
4010:
4002:
4000:9781428910676
3996:
3992:
3991:
3984:
3976:
3972:
3966:
3958:
3954:
3950:
3946:
3942:
3938:
3934:
3927:
3919:
3915:
3908:
3900:
3896:
3890:
3876:on 2013-11-01
3875:
3871:
3867:
3861:
3854:
3850:
3846:
3843:
3838:
3832:
3831:John Kiriakou
3826:
3811:
3804:
3789:
3785:
3779:
3771:
3767:
3761:
3755:
3744:on 2012-09-19
3743:
3739:
3735:
3729:
3714:
3708:
3694:on 2011-05-13
3693:
3689:
3683:
3677:
3673:
3670:
3665:
3657:
3653:
3647:
3641:
3637:
3634:
3629:
3615:on 2013-11-02
3614:
3610:
3604:
3597:
3593:
3590:
3585:
3571:on 2019-07-01
3570:
3566:
3560:
3551:
3544:
3538:
3531:
3525:
3514:
3508:
3493:
3489:
3483:
3481:
3479:
3477:
3468:
3464:
3457:
3455:
3453:
3438:on 2009-11-08
3434:
3427:
3423:
3417:
3409:
3403:
3399:
3395:
3389:
3383:, 7 May 2011.
3382:
3379:
3375:
3372:
3366:
3347:
3340:
3333:
3321:
3319:9783733802141
3315:
3311:
3310:
3305:
3304:Ulfkotte, Udo
3299:
3291:
3289:9780241305225
3285:
3281:
3274:
3260:
3256:
3249:
3241:
3237:
3233:
3229:
3225:
3221:
3217:
3213:
3209:
3202:
3194:
3190:
3186:
3182:
3178:
3174:
3170:
3166:
3162:
3155:
3140:
3136:
3130:
3128:
3126:
3118:
3112:
3104:
3100:
3094:
3090:
3075:
3072:
3070:
3067:
3065:
3062:
3060:
3057:
3055:
3052:
3050:
3047:
3045:
3042:
3040:
3039:Foreign agent
3037:
3035:
3032:
3030:
3027:
3025:
3022:
3020:
3017:
3015:
3014:Sleeper agent
3012:
3010:
3007:
3005:
3002:
3000:
2999:Special agent
2997:
2995:
2992:
2990:
2987:
2985:
2982:
2980:
2977:
2975:
2972:
2970:
2967:
2966:
2959:
2957:
2953:
2949:
2945:
2940:
2937:
2932:
2930:
2929:
2928:Spies Like Us
2924:
2923:
2918:
2917:
2912:
2911:
2905:
2903:
2901:
2896:
2895:
2890:
2889:
2888:GoldenEye 007
2884:
2883:
2878:
2873:
2871:
2870:
2864:
2862:
2861:Michael Caine
2859:as played by
2858:
2854:
2853:George Smiley
2850:
2846:
2842:
2841:Johnny Fedora
2838:
2836:
2832:
2828:
2827:Valerie Plame
2824:
2818:
2816:
2812:
2810:
2805:
2801:
2797:
2793:
2789:
2785:
2781:
2780:
2773:
2763:
2761:
2756:
2754:
2750:
2746:
2742:
2738:
2734:
2730:
2726:
2722:
2718:
2714:
2711:
2707:
2702:
2699:
2694:
2690:
2685:
2680:
2678:
2674:
2670:
2666:
2662:
2653:
2649:
2644:
2635:
2631:
2627:
2618:
2616:
2606:
2604:
2600:
2596:
2592:
2586:
2584:
2580:
2576:
2575:John Kiriakou
2572:
2568:
2564:
2560:
2556:
2546:
2544:
2540:
2536:
2532:
2528:
2525:
2521:
2517:
2516:life sentence
2513:
2508:
2506:
2502:
2492:
2490:
2486:
2482:
2478:
2474:
2470:
2466:
2462:
2458:
2453:
2450:
2448:
2444:
2443:
2438:
2434:
2430:
2426:
2422:
2418:
2414:
2410:
2406:
2395:
2392:
2384:
2374:
2370:
2366:
2360:
2358:
2351:
2342:
2341:
2330:
2326:
2323:
2319:
2318:Illegal agent
2316:
2313:
2309:
2305:
2302:
2298:
2295:
2292:
2288:
2287:
2286:
2280:
2277:
2274:
2270:
2266:
2262:
2261:Sleeper agent
2259:
2254:
2250:
2245:
2240:
2237:
2234:
2233:
2231:
2227:
2223:
2220:
2217:
2213:
2209:
2206:
2203:
2199:
2195:
2191:
2187:
2184:
2181:
2180:
2179:
2176:
2174:
2170:
2166:
2165:
2159:
2157:
2146:
2144:
2140:
2134:
2124:
2122:
2117:
2113:
2111:
2107:
2101:
2099:
2093:
2090:
2086:
2081:
2079:
2075:
2070:
2068:
2064:
2059:
2055:
2050:
2048:
2044:
2040:
2036:
2032:
2028:
2027:Special Agent
2024:
2020:
2016:
2007:
1998:
1997:
1990:
1987:
1985:
1982:
1980:
1977:
1975:
1974:Steganography
1972:
1970:
1967:
1965:
1962:
1960:
1957:
1955:
1952:
1950:
1947:
1945:
1942:
1940:
1937:
1935:
1932:
1930:
1929:Interrogation
1927:
1925:
1922:
1920:
1919:Impersonation
1917:
1915:
1912:
1910:
1907:
1904:
1901:
1899:
1896:
1894:
1891:
1889:
1886:
1884:
1881:
1879:
1876:
1874:
1871:
1869:
1866:
1864:
1861:
1860:
1857:
1853:
1843:
1841:
1830:
1827:December 2021
1818:
1813:
1804:
1803:
1800:
1798:
1794:
1790:
1786:
1782:
1778:
1774:
1773:
1766:
1764:
1760:
1756:
1752:
1747:
1744:
1740:
1739:interrogation
1736:
1732:
1728:
1724:
1723:cryptanalysis
1720:
1708:
1704:
1701:
1698:
1695:
1692:
1689:
1686:
1683:
1680:
1679:
1678:
1675:
1666:
1664:
1660:
1656:
1652:
1648:
1644:
1640:
1639:human sources
1635:
1633:
1629:
1619:
1617:
1613:
1609:
1605:
1601:
1597:
1593:
1589:
1585:
1581:
1577:
1573:
1569:
1567:
1563:
1559:
1555:
1551:
1547:
1543:
1539:
1535:
1531:
1527:
1523:
1519:
1515:
1511:
1507:
1502:
1500:
1496:
1492:
1488:
1484:
1480:
1476:
1472:
1467:
1465:
1461:
1457:
1456:Witte Brigade
1453:
1449:
1445:
1441:
1437:
1433:
1429:
1425:
1421:
1417:
1416:U.S. Congress
1413:
1412:United States
1409:
1405:
1397:
1393:
1390:), a Finnish
1389:
1385:
1380:
1376:
1374:
1370:
1366:
1362:
1358:
1353:
1351:
1347:
1339:
1328:
1324:
1323:trade secrets
1320:
1316:
1315:death penalty
1312:
1308:
1304:
1300:
1296:
1292:
1288:
1284:
1280:
1276:
1272:
1268:
1264:
1260:
1256:
1255:
1250:
1249:
1244:
1240:
1235:
1233:
1229:
1225:
1221:
1217:
1216:
1211:
1207:
1203:
1198:
1194:
1184:
1182:
1178:
1174:
1170:
1166:
1161:
1159:
1155:
1151:
1146:
1144:
1140:
1136:
1132:
1128:
1124:
1120:
1116:
1112:
1108:
1104:
1100:
1096:
1085:
1080:
1078:
1073:
1071:
1066:
1065:
1063:
1062:
1057:
1054:
1053:
1052:
1051:
1047:
1046:
1040:
1036:
1032:
1028:
1026:
1023:
1021:
1018:
1016:
1013:
1011:
1008:
1006:
1003:
1002:
1001:
1000:
996:
995:
990:
987:
985:
982:
980:
977:
974:
970:
967:
965:
964:Justification
962:
960:
957:
955:
952:
950:
949:
945:
943:
940:
938:
935:
933:
930:
928:
925:
923:
920:
918:
915:
913:
910:
909:
908:
907:
904:
901:
900:
895:
892:
890:
887:
885:
882:
880:
877:
875:
872:
870:
867:
866:
865:
864:
860:
859:
854:
851:
849:
846:
844:
841:
839:
836:
835:
834:
833:
829:
828:
823:
820:
818:
815:
813:
810:
808:
805:
803:
800:
798:
797:Miscegenation
795:
792:
788:
784:
780:
777:
775:
772:
770:
767:
765:
762:
760:
757:
755:
752:
750:
747:
745:
742:
740:
737:
735:
732:
731:
730:
729:
725:
724:
719:
716:
714:
711:
709:
706:
704:
701:
699:
696:
694:
691:
689:
686:
685:
684:
683:
679:
678:
673:
669:
666:
664:
661:
659:
656:
654:
651:
649:
646:
644:
641:
639:
636:
634:
633:Pickpocketing
631:
629:
626:
624:
621:
619:
616:
614:
611:
609:
606:
604:
601:
599:
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
571:
569:
566:
564:
561:
559:
556:
554:
551:
550:
549:
548:
544:
543:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
498:
495:
493:
490:
488:
485:
483:
482:Homosexuality
480:
478:
475:
473:
470:
468:
465:
463:
460:
458:
455:
454:
453:
452:
449:
446:
445:
440:
437:
435:
432:
430:
427:
425:
422:
420:
417:
413:
410:
409:
408:
405:
401:
398:
397:
396:
393:
391:
388:
385:
381:
378:
376:
373:
371:
368:
366:
363:
361:
358:
356:
353:
351:
348:
346:
345:Home invasion
343:
341:
338:
336:
333:
331:
328:
326:
323:
321:
318:
316:
313:
311:
308:
306:
303:
301:
298:
296:
295:Assassination
293:
292:
291:
290:
287:
284:
283:
278:
275:
273:
270:
268:
265:
263:
260:
259:
258:
257:
254:
251:
250:
244:
240:
237:
234:
231:
228:
224:
221:
220:
219:
218:
214:
213:
208:
205:
203:
200:
198:
195:
193:
190:
188:
185:
183:
180:
179:
178:
177:
174:
170:
169:
164:
161:
159:
156:
154:
153:
149:
147:
146:
142:
141:
140:
139:
136:
133:
132:
129:
126:
125:
121:
117:
116:
113:
105:
102:
94:
91:February 2019
84:
80:
76:
70:
68:
61:
52:
51:
45:
41:
33:
19:
7137:Solicitation
7072:Prostitution
7062:Masturbation
6895:Lèse-majesté
6884:Against the
6679:Embezzlement
6568:Manslaughter
6553:Intimidation
6391:jurisdiction
6388:
6332:Arne Treholt
6307:Ignace Reiss
6249:Ryūzō Sejima
6239:SanzĹŤ Nosaka
6195:Elena Miller
6152:John Vassall
6127:Goronwy Rees
6082:George Blake
6064:Konon Molody
6049:Morris Cohen
5971:
5952:Anna Chapman
5871:Robert Lipka
5861:Karl Koecher
5811:Aldrich Ames
5773:Maria Wicher
5713:Vincent Reno
5708:Lee Pressman
5693:Victor Perlo
5688:William Perl
5678:Boris Morros
5673:Hede Massing
5663:George Koval
5613:Morris Cohen
5593:Earl Browder
5280:Surveillance
5270:Resident spy
5211:Cryptography
5158:
5016:Surveillance
4804:Cyber spying
4789:Cryptography
4728:Resident spy
4713:Double agent
4693:
4661:
4608:
4601:
4594:
4582:
4553:
4549:
4546:CĂ©cile Fabre
4541:
4534:
4527:
4521:
4514:
4507:
4500:
4493:
4479:
4461:Meng Wanzhou
4417:
4413:
4395:
4385:
4382:Keegan, John
4375:
4359:
4352:
4343:
4340:Gopnik, Adam
4333:
4326:
4320:September 2,
4318:. Retrieved
4312:
4303:
4293:
4280:
4240:
4236:
4215:
4187:
4181:
4173:the original
4168:
4158:
4150:
4145:
4127:
4122:
4114:the original
4109:
4100:
4077:
4071:
4042:
4034:
4015:
4009:
3989:
3983:
3965:
3940:
3936:
3932:
3926:
3913:
3907:
3889:
3878:. Retrieved
3874:the original
3869:
3860:
3837:
3825:
3814:. Retrieved
3803:
3791:. Retrieved
3787:
3778:
3770:the original
3760:
3753:
3746:. Retrieved
3742:the original
3737:
3728:
3717:. Retrieved
3707:
3696:. Retrieved
3692:the original
3682:
3664:
3656:the original
3646:
3628:
3617:. Retrieved
3613:the original
3603:
3584:
3573:. Retrieved
3569:the original
3559:
3550:
3537:
3524:
3507:
3495:. Retrieved
3491:
3462:
3440:. Retrieved
3433:the original
3416:
3397:
3388:
3380:
3365:
3355:September 3,
3353:. Retrieved
3339:
3330:
3323:. Retrieved
3308:
3298:
3279:
3273:
3262:. Retrieved
3258:
3248:
3215:
3211:
3201:
3168:
3164:
3154:
3142:. Retrieved
3138:
3116:
3111:
3093:
2952:S.H.I.E.L.D.
2941:
2935:
2933:
2926:
2920:
2914:
2908:
2906:
2899:
2892:
2886:
2882:Perfect Dark
2880:
2874:
2869:The Baroness
2867:
2865:
2857:Harry Palmer
2839:
2819:
2807:
2800:Central Asia
2790:between the
2777:
2775:
2757:
2721:World War II
2715:
2703:
2681:
2657:
2632:
2628:
2624:
2612:
2587:
2563:World War II
2552:
2535:Soviet Union
2509:
2505:Josef Jakobs
2501:World War II
2498:
2454:
2451:
2440:
2429:Eastern Bloc
2421:Aldrich Ames
2402:
2387:
2378:
2354:
2300:
2284:
2279:Triple agent
2272:
2268:
2264:
2252:
2248:
2244:double agent
2243:
2222:Double agent
2212:publications
2201:
2193:
2177:
2173:case officer
2172:
2168:
2162:
2160:
2152:
2136:
2118:
2114:
2112:and others.
2102:
2094:
2088:
2084:
2082:
2071:
2062:
2051:
2023:case officer
2012:
2001:Organization
1995:
1994:
1979:Surveillance
1893:Cyber spying
1878:Covert agent
1837:
1824:
1816:
1770:
1767:
1748:
1716:
1676:
1672:
1636:
1625:
1570:
1503:
1487:Soviet Union
1471:World War II
1468:
1428:World War II
1408:great powers
1401:
1395:
1387:
1354:
1350:police-state
1346:Daniel Defoe
1329:of England (
1267:inquisitions
1254:Arthashastra
1252:
1246:
1236:
1213:
1199:
1196:
1165:enemy forces
1162:
1156:is known as
1154:corporations
1147:
1118:
1114:
1111:intelligence
1102:
1098:
1094:
1093:
989:Self-defense
946:
878:
869:Lèse-majesté
583:Embezzlement
507:Prostitution
497:Masturbation
380:Manslaughter
365:Intimidation
277:Solicitation
150:
143:
128:Criminal law
112:
97:
88:
64:
7042:Fornication
6959:Obstruction
6939:Compounding
6749:Tax evasion
6498:Child abuse
6412:Misdemeanor
6317:Herman Simm
6302:Alfred Redl
6258:Elsewhere /
6157:Arthur Wynn
6097:Klaus Fuchs
6087:David Crook
6011:Guy Burgess
5940:Post-Soviet
5831:Jack Dunlap
5806:Rudolf Abel
5778:Nathan Witt
5753:Harold Ware
5728:Saville Sax
5658:Donald Hiss
5628:Klaus Fuchs
5598:Boris Bukov
5352:Geophysical
5134:Cell system
5121:Clandestine
5006:Stay-behind
4915:Recruitment
4872:Canary trap
4770:Devices and
4718:Field agent
4578:." (p. 34.)
4436:computation
4372:Kahn, David
4208:Works cited
3652:"espionage"
3400:. Berkley.
3171:(1): 1–18.
3099:"Espionage"
2831:existential
2772:Spy fiction
2766:Spy fiction
2689:belligerent
2673:prosecution
2457:World War I
2381:August 2024
2230:fabricators
2137:Reportedly
1785:§§ 792
1759:Oslo Report
1592:Vietnam War
1566:Rudolf Abel
1546:Guy Burgess
1479:former USSR
1418:passed the
1410:except the
1404:World War I
1361:Nathan Hale
1355:During the
1327:Elizabeth I
1283:ambassadors
1279:city-states
1259:Middle Ages
1251:and in the
1241:as well as
1135:clandestine
984:Provocation
708:Obstruction
688:Compounding
653:Tax evasion
477:Fornication
310:Child abuse
239:Misdemeanor
163:Concurrence
7179:Categories
7150:WikiSource
7132:Incitement
7127:Conspiracy
7002:Bestiality
6954:Misprision
6918:Subversion
6874:War crimes
6869:Usurpation
6796:Corruption
6674:Cybercrime
6558:Kidnapping
6538:Hate crime
6528:Harassment
6508:Defamation
6462:Law portal
6437:Corruption
6427:Indictable
6407:Infraction
6044:Lona Cohen
6026:Kim Philby
5901:Myra Soble
5896:Jack Soble
5638:Harry Gold
5623:Noel Field
5608:Lona Cohen
5381:earthquake
5245:False flag
5083:Collection
5001:Sexpionage
4981:COINTELPRO
4974:safe house
4954:False flag
4891:Operations
4865:techniques
4861:Tradecraft
4465:bank fraud
4218:. London:
4051:. p.
3880:2013-08-16
3816:2011-03-19
3748:2014-01-03
3719:2011-03-19
3698:2011-03-19
3619:2013-08-17
3575:2010-05-14
3442:2007-10-01
3264:2023-12-21
3259:HistoryNet
3081:References
2900:Metal Gear
2897:, and the
2877:video game
2849:James Bond
2788:Great Game
2661:combatants
2417:Rosenbergs
2405:legal code
2156:false flag
2067:tradecraft
2047:safe house
1959:Safe house
1905:operations
1903:False flag
1852:Tradecraft
1850:See also:
1755:subterfuge
1632:terrorists
1622:Modern day
1510:Alger Hiss
1398:) in 1930s
1263:subversion
1222:, and the
1169:dissidents
1123:government
942:Entrapment
917:Automatism
894:Subversion
853:Bestiality
822:War crimes
817:Usurpation
744:Corruption
703:Misprision
578:Cybercrime
370:Kidnapping
350:Hate crime
340:Harassment
320:Defamation
272:Incitement
267:Conspiracy
233:Infraction
192:Complicity
187:Accomplice
145:Actus reus
7185:Espionage
7160:Wikiquote
7102:Voyeurism
7082:Pederasty
7067:Obscenity
6908:Secession
6904:Espionage
6864:Terrorism
6826:Smuggling
6764:Vandalism
6744:Smuggling
6684:Extortion
6659:Blackmail
6572:corporate
6378:Types of
6210:Fred Rose
6117:John Peet
6054:Ethel Gee
5698:J. Peters
5583:Joel Barr
5563:In the US
5372:Materials
5226:Defection
5221:Dead drop
5194:black bag
5159:Espionage
4925:black bag
4809:Dead drop
4738:Spymaster
4662:Espionage
4265:201749182
4257:1543-7795
3957:156655154
3943:(2): 41.
3715:. fas.org
3325:6 January
3240:220652440
3185:0017-3835
3086:Citations
2994:Detective
2910:Get Smart
2717:Saboteurs
2677:execution
2665:disguises
2591:stateless
2369:talk page
2273:activated
2255:is blown.
2074:defectors
1898:Dead drop
1769:nation".
1554:Otto John
1464:Home Army
1424:Mata Hari
1392:socialite
1352:methods.
1257:. In the
1095:Espionage
1005:Contracts
979:Necessity
884:Secession
879:Espionage
812:Terrorism
774:Smuggling
668:Vandalism
648:Smuggling
588:Extortion
563:Blackmail
537:Voyeurism
517:Pederasty
502:Obscenity
384:corporate
207:Vicarious
202:Principal
197:Corporate
182:Accessory
173:liability
158:Causation
79:talk page
7200:Security
7165:Wikinews
7022:Adultery
6992:Poaching
6928:Against
6913:Sedition
6859:Regicide
6811:Genocide
6786:Apostasy
6768:Mischief
6704:Gambling
6669:Burglary
6640:property
6638:Against
6622:Stabbing
6617:Stalking
6600:Homicide
6563:Menacing
6543:Homicide
6180:Sam Carr
5798:Cold War
5578:John Abt
5432:Analysis
5230:Turncoat
5177:handling
4991:SHAMROCK
4844:microdot
4747:Analysis
4316:. US CIA
4228:52130886
4135:Archived
3845:Archived
3672:Archived
3636:Archived
3592:Archived
3396:(1987).
3374:Archived
3332:empfahl.
3306:(1997).
3232:26098615
2962:See also
2956:Avengers
2948:Iron Man
2569:such as
2533:for the
2363:You may
2226:Peddlers
2098:sabotage
2096:such as
2043:couriers
1969:Spy ship
1954:Sabotage
1924:Impostor
1914:Honeypot
1576:Mongolia
1506:Cold War
1475:Cold War
1307:archives
1299:security
1173:sabotage
1150:military
1020:Property
1015:Evidence
1010:Defenses
959:Insanity
889:Sedition
843:Poaching
807:Regicide
759:Genocide
734:Apostasy
672:Mischief
608:Gambling
573:Burglary
457:Adultery
434:Stabbing
429:Stalking
412:Homicide
375:Menacing
355:Homicide
152:Mens rea
135:Elements
73:You may
7122:Attempt
6964:Perjury
6930:justice
6900:Treason
6843:smoking
6839:alcohol
6806:Dueling
6791:Begging
6739:Robbery
6719:Looting
6714:Larceny
6694:Forgery
6664:Bribery
6627:Torture
6612:Robbery
6570: (
6523:Frameup
6493:Battery
6488:Assault
6422:Summary
6400:Classes
5987:In the
5379: (
5357:Nuclear
5327:TEMPEST
4986:MINARET
4930:wetwork
4568:Soviets
4517:(1992).
4503:(1984).
4444:nuclear
4388:, 2003.
4306:, 1944.
4296:, 2018.
4285:excerpt
4130:(2008)
3738:Bop.gov
3633:treason
3589:Illegal
3554:Cia.gov
3497:12 July
3144:12 July
2944:Russian
2809:The Spy
2698:treason
2413:treason
2329:handler
2312:staging
2308:garages
2265:wake up
2216:mislead
2058:treason
2033:(i.e.,
1996:Source:
1888:Cut-out
1817:updated
1540:of the
1504:In the
1493:to the
1491:Okhrana
1432:Germany
1382:Madame
1187:History
1143:illegal
1127:company
1048:Portals
1039:estates
971: (
969:Mistake
954:Infancy
922:Consent
874:Treason
791:smoking
787:alcohol
754:Dueling
739:Begging
713:Perjury
643:Robbery
623:Looting
618:Larceny
598:Forgery
568:Bribery
439:Torture
424:Robbery
382: (
335:Frameup
305:Battery
300:Assault
262:Attempt
7052:Incest
7027:Bigamy
6854:Piracy
6841:, and
6724:Payola
6588:felony
6583:Murder
6578:Mayhem
6432:Hybrid
6417:Felony
6172:Canada
5216:Cutout
5167:Agents
5021:Global
4947:MASINT
4942:SIGINT
4794:Cutout
4678:Assets
4673:Agents
4604:(2014)
4587:(2003)
4576:Poland
4530:(1977)
4486:
4448:Huawei
4428:prisms
4365:
4263:
4255:
4226:
4194:
4132:online
4088:
4059:
4022:
3997:
3955:
3793:5 June
3669:spying
3404:
3316:
3286:
3238:
3230:
3193:643204
3191:
3183:
2919:, and
2902:series
2855:, and
2847:, but
2796:Russia
2706:airmen
2654:, 1880
2577:, and
2539:Russia
2531:spying
2301:target
2143:German
2139:Canada
2089:is not
2085:legend
2063:legend
1783:
1727:COMINT
1719:HUMINT
1657:) and
1647:SIGINT
1580:Russia
1481:. The
1460:Milorg
1454:, the
1406:, all
1291:Venice
1271:heresy
1218:, the
1099:spying
1035:trusts
973:of law
937:Duress
802:Piracy
789:, and
628:Payola
487:Incest
462:Bigamy
400:felony
395:Murder
390:Mayhem
223:Felony
18:Spying
6886:state
6835:drugs
6754:Theft
6699:Fraud
6649:Arson
6380:crime
6221:Japan
5391:Other
5362:Radar
5206:Cover
5184:Asset
5172:field
4706:Agent
4701:Cover
4261:S2CID
3953:S2CID
3516:(PDF)
3436:(PDF)
3429:(PDF)
3349:(PDF)
3236:S2CID
3228:JSTOR
3189:JSTOR
2663:wear
2371:, or
2253:cover
2200:. In
2171:, or
2019:asset
1735:OSINT
1731:IMINT
1707:moles
1651:IMINT
1641:over
1608:SAVAK
1604:Syria
1596:Libya
1584:India
1572:China
1448:Maier
1388:right
1243:peace
1220:Bible
1215:Iliad
1101:, or
1031:Wills
1025:Torts
783:drugs
658:Theft
603:Fraud
553:Arson
81:, or
7077:Rape
5026:Mass
4996:FVEY
4723:Mole
4510:1991
4484:ISBN
4472:HSBC
4440:Iran
4408:and
4363:ISBN
4336:2005
4322:2012
4253:ISSN
4224:OCLC
4220:HMSO
4192:ISBN
4086:ISBN
4057:ISBN
4020:ISBN
3995:ISBN
3795:2023
3499:2021
3402:ISBN
3357:2021
3327:2023
3314:ISBN
3284:ISBN
3181:ISSN
3146:2021
2794:and
2682:The
2597:and
2537:and
1854:and
1649:and
1630:and
1602:and
1600:Iran
1582:and
1560:and
1548:and
1434:and
1396:left
1363:and
1303:doge
1037:and
512:Rape
241:(or
225:(or
42:and
6219:In
6170:In
4863:and
4574:in
4245:doi
4053:106
3945:doi
3935:".
3220:doi
3173:doi
3103:MI5
2969:MI5
2779:Kim
2735:in
2729:FBI
2708:as
2650:by
2638:War
2561:in
2524:CIA
2336:Law
2249:may
2065:in
2037:or
2025:or
2017:, "
1789:798
1725:or
1663:GRU
1655:KGB
1542:GRU
1495:KGB
1336:),
1285:in
1239:war
1119:spy
1117:or
1056:Law
7181::
6837:,
6766:,
5989:UK
5228:/
4593:,
4548:,
4459:,
4452:5G
4412:,
4394:,
4384:,
4374:,
4302:,
4292:,
4259:.
4251:.
4241:73
4239:.
4222:.
4167:.
4108:.
4080:.
4055:.
4047:.
3973:.
3951:.
3939:.
3916:.
3897:.
3868:.
3786:.
3736:.
3490:.
3475:^
3465:.
3451:^
3381:AP
3329:.
3257:.
3234:.
3226:.
3216:21
3214:.
3210:.
3187:.
3179:.
3169:45
3167:.
3163:.
3137:.
3124:^
3101:.
2958:.
2904:.
2891:,
2885:,
2863:.
2817:.
2792:UK
2755:.
2679:.
2605:.
2585:.
2573:,
2487:,
2483:,
2479:,
2475:,
2471:,
2467:,
2463:,
2228:,
2167:,
2108:,
2100:.
2083:A
1842:.
1618:.
1598:,
1578:,
1532:,
1528:,
1520:,
1512:,
1458:,
1430:,
1422:.
1359:,
1342:c.
1332:r.
1234:.
1160:.
1129:,
1125:,
1097:,
1033:,
785:,
670:,
6845:)
6574:)
6371:e
6364:t
6357:v
5549:e
5542:t
5535:v
5383:)
5067:e
5060:t
5053:v
4654:e
4647:t
4640:v
4324:.
4267:.
4247::
4230:.
4200:.
4094:.
4065:.
4028:.
4003:.
3977:.
3959:.
3947::
3941:6
3901:.
3883:.
3855:)
3819:.
3797:.
3751:.
3722:.
3701:.
3622:.
3578:.
3541:"
3528:"
3518:.
3501:.
3445:.
3410:.
3359:.
3292:.
3267:.
3222::
3195:.
3175::
3148:.
3105:.
2811:,
2394:)
2388:(
2383:)
2379:(
2361:.
2275:.
1829:)
1825:(
1799:.
1787:–
1661:(
1386:(
1340:(
1109:(
1083:e
1076:t
1069:v
975:)
793:)
386:)
245:)
229:)
104:)
98:(
93:)
89:(
71:.
46:.
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.