Fair play the moral dilemmas of spying
Introduction : a career under coverPhilosophical and historical arguments -- Bible -- Aristotle -- Cicero -- St. Thomas Aquinas -- Machiavelli -- Kant -- Realpolitik -- Utilitarianism -- Veritatis Splendor -- U.S. attitudes toward spying -- Scenarios -- 1. Homosexual blackmail -- 2. Trojan horse --...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Washington, D.C
Potomac Books
c2006
|
Ausgabe: | 1st ed |
Schlagworte: | |
Online Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Introduction : a career under coverPhilosophical and historical arguments -- Bible -- Aristotle -- Cicero -- St. Thomas Aquinas -- Machiavelli -- Kant -- Realpolitik -- Utilitarianism -- Veritatis Splendor -- U.S. attitudes toward spying -- Scenarios -- 1. Homosexual blackmail -- 2. Trojan horse -- 3. False flag -- 4. Hit team -- 5. Torture -- 6. Kidnapping and torture by surrogates -- 7. Truth serum -- 8. Journalism cover -- 9. Operational use of journalists -- 10. Human rights violators -- 11. Torture training -- 12. Humanitarian aid worker cover -- 13. Missionary cover -- 14. Operational use of academics -- 15. P-sources -- 16. Prostitute for terrorist -- 17. Child prostitute -- 18. Terrorist act for bona fides -- 19. Election tampering -- 20. Seduction and compromise -- 21. Romeo operations -- 22. Coercive pitch -- 23. Feeding a drug habit -- 24. Kidnapping or killing a defector -- 25. Fabricating evidence -- 26. L-devices -- 27. Insertion operations -- 28. Fake diagnosis -- 29. Drugging a foreign diplomat -- 30. Press placements -- 31. Fabricating academic credentials -- 32. Plagiarizing a Ph.D. dissertation -- 33. Exposing unwitting person to risk -- 34. Kamikaze dolphins -- 35. Spying on Americans overseas -- 36. Spying on friends -- 37. Spying on the United Nations -- 38. Industrial espionage -- 39. Bribing a foreign government -- 40. Tampering with U.S. mail -- 41. Protection of code breaking -- 42. Breaking a promise to an agent -- 43. Unauthorized cover -- 44. Bogus Websites and chatrooms -- 45. Back doors -- 46. Biological attack -- 47. Forging documents from friendly countries -- 48. Collateral damage -- 49. Foreign officer visitors -- 50. Interrogation -- Afterword -- Notes : Spying 101 -- The essential intelligence library -- Commentators. Introduction : a career under cover -- Philosophical and historical arguments -- Bible -- Aristotle -- Cicero -- St. Thomas Aquinas -- Machiavelli -- Kant -- Realpolitik -- Utilitarianism -- Veritatis Splendor -- U.S. attitudes toward spying -- Scenarios -- 1. Homosexual blackmail -- 2. Trojan horse -- 3. False flag -- 4. Hit team -- 5. Torture -- 6. Kidnapping and torture by surrogates -- 7. Truth serum -- 8. Journalism cover -- 9. Operational use of journalists -- 10. Human rights violators -- 11. Torture training -- 12. Humanitarian aid worker cover -- 13. Missionary cover -- 14. Operational use of academics -- 15. P-sources -- 16. Prostitute for terrorist -- 17. Child prostitute -- 18. Terrorist act for bona fides -- 19. Election tampering -- 20. Seduction and compromise -- 21. Romeo operations -- 22. Coercive pitch -- 23. Feeding a drug habit -- 24. Kidnapping or killing a defector -- 25. Fabricating evidence -- 26. L-devices -- 27. Insertion operations -- 28. Fake diagnosis -- 29. Drugging a foreign diplomat -- 30. Press placements -- 31. Fabricating academic credentials -- 32. Plagiarizing a Ph.D. dissertation -- 33. Exposing unwitting person to risk -- 34. Kamikaze dolphins -- 35. Spying on Americans overseas -- 36. Spying on friends -- 37. Spying on the United Nations -- 38. Industrial espionage -- 39. Bribing a foreign government -- 40. Tampering with U.S. mail -- 41. Protection of code breaking -- 42. Breaking a promise to an agent -- 43. Unauthorized cover -- 44. Bogus Websites and chatrooms -- 45. Back doors -- 46. Biological attack -- 47. Forging documents from friendly countries -- 48. Collateral damage -- 49. Foreign officer visitors -- 50. Interrogation -- Afterword -- Notes : Spying 101 -- The essential intelligence library -- Commentators |
---|---|
Beschreibung: | Includes bibliographical references (p. 263-268) and index |
Beschreibung: | xii, 291 S 24 cm |
ISBN: | 1574889494 1-57488-949-4 9781574889499 978-1-57488-949-9 |