Fair play : the moral dilemmas of spying /
"Revolutionary War officer Nathan Hale, one of America's first spies, said, "Any kind of service necessary to the public good becomes honorable by being necessary." A statue of Hale stands outside CIA headquarters, and the agency often cites his statement as one of its guiding pr...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Washington, D.C. :
Potomac Books,
[2006]
|
Edición: | First edition |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Introduction : a career under cover
- Philosophical and historical arguments
- Bible
- Aristotle
- Cicero
- St. Thomas Aquinas
- Machiavelli
- Kant
- Realpolitik
- Utilitarianism
- Veritatis Splendor
- U.S. attitudes toward spying
- Scenarios
- 1. Homosexual blackmail
- 2. Trojan horse
- 3. False flag
- 4. Hit team
- 5. Torture
- 6. Kidnapping and torture by surrogates
- 7. Truth serum
- 8. Journalism cover
- 9. Operational use of journalists
- 10. Human rights violators
- 11. Torture training
- 12. Humanitarian aid worker cover
- 13. Missionary cover
- 14. Operational use of academics
- 15. P-sources
- 16. Prostitute for terrorist
- 17. Child prostitute
- 18. Terrorist act for bona fides
- 19. Election tampering
- 20. Seduction and compromise
- 21. Romeo operations
- 22. Coercive pitch
- 23. Feeding a drug habit
- 24. Kidnapping or killing a defector
- 25. Fabricating evidence
- 26. L-devices
- 27. Insertion operations
- 28. Fake diagnosis
- 29. Drugging a foreign diplomat
- 30. Press placements
- 31. Fabricating academic credentials
- 32. Plagiarizing a Ph. D. dissertation
- 33. Exposing unwitting person to risk
- 34. Kamikaze dolphins
- 35. Spying on Americans overseas
- 36. Spying on friends
- 37. Spying on the United Nations
- 38. Industrial espionage
- 39. Bribing a foreign government
- 40. Tampering with U.S. mail
- 41. Protection of code breaking
- 42. Breaking a promise to an agent
- 43. Unauthorized cover
- 44. Bogus Websites and chatrooms
- 45. Back doors
- 46. Biological attack
- 47. Forging documents from friendly countries
- 48. Collateral damage
- 49. Foreign officer visitors
- 50. Interrogation
- Afterword
- Notes : Spying 101
- The essential intelligence library
- Commentators.