Fair play the moral dilemmas of spying

Introduction : a career under coverPhilosophical and historical arguments -- Bible -- Aristotle -- Cicero -- St. Thomas Aquinas -- Machiavelli -- Kant -- Realpolitik -- Utilitarianism -- Veritatis Splendor -- U.S. attitudes toward spying -- Scenarios -- 1. Homosexual blackmail -- 2. Trojan horse --...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Olson, James M. (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Washington, D.C Potomac Books c2006
Ausgabe:1st ed
Schlagworte:
Online Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Introduction : a career under coverPhilosophical and historical arguments -- Bible -- Aristotle -- Cicero -- St. Thomas Aquinas -- Machiavelli -- Kant -- Realpolitik -- Utilitarianism -- Veritatis Splendor -- U.S. attitudes toward spying -- Scenarios -- 1. Homosexual blackmail -- 2. Trojan horse -- 3. False flag -- 4. Hit team -- 5. Torture -- 6. Kidnapping and torture by surrogates -- 7. Truth serum -- 8. Journalism cover -- 9. Operational use of journalists -- 10. Human rights violators -- 11. Torture training -- 12. Humanitarian aid worker cover -- 13. Missionary cover -- 14. Operational use of academics -- 15. P-sources -- 16. Prostitute for terrorist -- 17. Child prostitute -- 18. Terrorist act for bona fides -- 19. Election tampering -- 20. Seduction and compromise -- 21. Romeo operations -- 22. Coercive pitch -- 23. Feeding a drug habit -- 24. Kidnapping or killing a defector -- 25. Fabricating evidence -- 26. L-devices -- 27. Insertion operations -- 28. Fake diagnosis -- 29. Drugging a foreign diplomat -- 30. Press placements -- 31. Fabricating academic credentials -- 32. Plagiarizing a Ph.D. dissertation -- 33. Exposing unwitting person to risk -- 34. Kamikaze dolphins -- 35. Spying on Americans overseas -- 36. Spying on friends -- 37. Spying on the United Nations -- 38. Industrial espionage -- 39. Bribing a foreign government -- 40. Tampering with U.S. mail -- 41. Protection of code breaking -- 42. Breaking a promise to an agent -- 43. Unauthorized cover -- 44. Bogus Websites and chatrooms -- 45. Back doors -- 46. Biological attack -- 47. Forging documents from friendly countries -- 48. Collateral damage -- 49. Foreign officer visitors -- 50. Interrogation -- Afterword -- Notes : Spying 101 -- The essential intelligence library -- Commentators.
Introduction : a career under cover -- Philosophical and historical arguments -- Bible -- Aristotle -- Cicero -- St. Thomas Aquinas -- Machiavelli -- Kant -- Realpolitik -- Utilitarianism -- Veritatis Splendor -- U.S. attitudes toward spying -- Scenarios -- 1. Homosexual blackmail -- 2. Trojan horse -- 3. False flag -- 4. Hit team -- 5. Torture -- 6. Kidnapping and torture by surrogates -- 7. Truth serum -- 8. Journalism cover -- 9. Operational use of journalists -- 10. Human rights violators -- 11. Torture training -- 12. Humanitarian aid worker cover -- 13. Missionary cover -- 14. Operational use of academics -- 15. P-sources -- 16. Prostitute for terrorist -- 17. Child prostitute -- 18. Terrorist act for bona fides -- 19. Election tampering -- 20. Seduction and compromise -- 21. Romeo operations -- 22. Coercive pitch -- 23. Feeding a drug habit -- 24. Kidnapping or killing a defector -- 25. Fabricating evidence -- 26. L-devices -- 27. Insertion operations -- 28. Fake diagnosis -- 29. Drugging a foreign diplomat -- 30. Press placements -- 31. Fabricating academic credentials -- 32. Plagiarizing a Ph.D. dissertation -- 33. Exposing unwitting person to risk -- 34. Kamikaze dolphins -- 35. Spying on Americans overseas -- 36. Spying on friends -- 37. Spying on the United Nations -- 38. Industrial espionage -- 39. Bribing a foreign government -- 40. Tampering with U.S. mail -- 41. Protection of code breaking -- 42. Breaking a promise to an agent -- 43. Unauthorized cover -- 44. Bogus Websites and chatrooms -- 45. Back doors -- 46. Biological attack -- 47. Forging documents from friendly countries -- 48. Collateral damage -- 49. Foreign officer visitors -- 50. Interrogation -- Afterword -- Notes : Spying 101 -- The essential intelligence library -- Commentators
Beschreibung:Includes bibliographical references (p. 263-268) and index
Beschreibung:xii, 291 S
24 cm
ISBN:1574889494
1-57488-949-4
9781574889499
978-1-57488-949-9