Results for 'Cyber espionage'

649 found
Order:
  1.  36
    Beyond Machines: Humans in Cyber Operations, Espionage, and Conflict.David Danks & Joseph H. Danks - unknown
    It is the height of banality to observe that people, not bullets, fight kinetic wars. The machinery of kinetic warfare is obviously relevant to the conduct of each particular act of warfare, but the reasons for, and meanings of, those acts depend critically on the fact that they are done by humans. Any attempt to understand warfare—its causes, strategies, legitimacy, dynamics, and resolutions—must incorporate humans as an intrinsic part, both descriptively and normatively. Humans from general staff to “boots on the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  29
    Cyber Intelligence and Influence: In Defense of “Cyber Manipulation Operations” to Parry Atrocities.Rhiannon Neilsen - 2023 - Ethics and International Affairs 37 (2):161-176.
    Intelligence operations overwhelmingly focus on obtaining secrets (espionage) and the unauthorized disclosure of secrets by a public official in one political community to another (treason). It is generally understood that the principal responsibility of spies is to successfully procure secrets about the enemy. Yet, in this essay, I ask: Are spies and traitors ethically justified in using cyber operations not merely to acquire secrets (cyber espionage) but also to covertly manipulate or falsify information (cyber manipulation) (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  78
    Corporate espionage and workplace trust/distrust.Marjorie Chan - 2003 - Journal of Business Ethics 42 (1):45 - 58.
    The central focus of this research is: The growing corporate espionage activities due to fierce competition lead to highly controlling security measures and intensive employee monitoring which bring about distrust in the workplace. The paper examines various research works on trust and distrust. It highlights the conflictful demands managers face. They have to deter espionage activities, but at the same time, build trusting relationships in the workplace. The paper also describes various operations, personnel, physical and technical countermeasuresto combat (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  4.  8
    Espionage, statecraft, and the theory of reporting: a philosophical essay on intelligence management.Nicholas Rescher - 2017 - Pittsburgh, Pennsylvania: University of Pittsburgh Press.
    Everything we know about what goes on in the world comes to us through reports, information transmitted through human communication. We rely on reports, which can take any number of forms, to convey useful information, and we derive knowledge from that information. It's no surprise, then, that reporting has many philosophical dimensions. Because it plays such a major role in knowledge management, as Nicholas Rescher argues, the epistemology of reporting not only deserves our attention but also sheds important light on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5. USC Football Notebook: Robey, McDonald Secondary Stalwarts.White House Confirms Cyber Attack - forthcoming - Hermes.
     
    Export citation  
     
    Bookmark  
  6.  36
    Espionage and The Harming of Innocents.Lars Christie - 2024 - Criminal Law and Philosophy 18 (3):793-803.
    In her latest book _Spying Through a Glass Darkly: The Ethics of Espionage and Counter-Intelligence_, Cécile Fabre suggests that the deception of third parties during an infiltration operation can be justified as a foreseen but unintended side effect. In this essay, I criticize this view. Such deception, I argue, is better justified paternalistically as a means of preventing third parties from becoming wrongful threats. In the second part of the article, I show that Fabre ignores an important moral complication (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  7.  28
    Espionage, Ethics, and Law: From Philosophy to Practice.Cécile Fabre - 2024 - Criminal Law and Philosophy 18 (3):833-852.
    In this paper, I respond to Lars Christie, David Omand and Stephen Ratner for their thoughtful comments on my book Spying through a Glass Darkly. In that book, I provide a philosophical defence of espionage and counter-intelligence activities. I have little to say about how best to implement the moral norms I defend so that they can help guide intelligence officers’ actions, in the world as we know it here and now. Relatedly, I have little if anything to say (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  22
    Espionage, Secrecy, and Institutional Moral Reasoning.Steven Ratner - 2024 - Criminal Law and Philosophy 18 (3):819-832.
    Cecile Fabre’s Through a Glass Darkly offers a compelling account of the ethics of espionage drawn from both interpersonal morality and democratic and cosmopolitan political theory. Yet the spying that her theory finds permissible or prohibited does not map onto the spying that states undertake and that international law either explicitly or implicitly authorizes. That law allows or tolerates significant spying to promote compliance with diverse international legal regimes as well as advance other important public order values — well (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  9.  7
    Espionage, Statecraft and the Theory of Reporting: A Philosophical Theory on Intelligence Management by Nicholas Rescher.Jude P. Dougherty - 2018 - Review of Metaphysics 72 (1):149-151.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  33
    Espionage, Statecraft, and the Theory of Reporting: A Philosophical Essay on Intelligence Management, by Nicholas Rescher.Gregory Havrilak - 2019 - Teaching Philosophy 42 (1):67-70.
  11. "Repugnant Philosophy": Ethics, Espionage, and Covert Action.L. Perry David - 1995 - Journal of Conflict Studies 15 (1).
    The sources and methods of espionage, the goals and tactics of covert action, and the professional conduct of intelligence officers are matters typically hidden from public scrutiny, yet clearly worthy of public debate and philosophical attention. Recent academic studies of intelligence that have had any intentional bearing on ethics or political philosophy have largely focused on procedural questions surrounding the proper degree of oversight of intelligence agencies. But what is often missed in such examinations is substantive ethical analysis of (...)
     
    Export citation  
     
    Bookmark   3 citations  
  12.  36
    The Ethics of Economic Espionage.Ross W. Bellaby - 2023 - Ethics and International Affairs 37 (2):116-133.
    The ethical value of intelligence lies in its crucial role in safeguarding individuals from harm by detecting, locating, and preventing threats. As part of this undertaking, intelligence can include protecting the economic well-being of the political community and its people. Intelligence, however, also entails causing people harm when it violates their vital interests through its operations. The challenge, therefore, is how to reconcile this tension, which Cécile Fabre's recent book Spying through a Glass Darkly does by arguing for the “ongoing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  27
    Technology in Espionage and Counterintelligence: Some Cautionary Lessons from Armed Conflict.Alex Leveringhaus - 2023 - Ethics and International Affairs 37 (2):147-160.
    This essay contends that the ethics around the use of spy technology to gather intelligence (TECHINT) during espionage and counterintelligence operations is ambiguous. To build this argument, the essay critically scrutinizes Cécile Fabre's recent and excellent book Spying through a Glass Darkly, which argues that there are no ethical differences between the use of human intelligence (HUMINT) obtained from or by human assets and TECHINT in these operations. As the essay explains, Fabre arrives at this position by treating TECHINT (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  16
    From Espionage to Eschatology.Charles F. Duffy - 1980 - Renascence 32 (2):79-88.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  31
    Industrial Espionage and Technology Transfer: Britain and France in the Eighteenth Century. J. R. Harris.Geoffrey Tweedale - 2000 - Isis 91 (3):591-592.
  16.  34
    Motives of espionage against ones own country in the light of idiographic studies.Sebastian Michalak - 2011 - Polish Psychological Bulletin 42 (1):1-4.
    Motives of espionage against ones own country in the light of idiographic studies The money is perceived as the common denominator among people who have spied against their own country. This assumption is common sense and appears to be self-evident truth. But do we have any hard evidences to prove the validity of such a statement? What method could be applied to determine it? This article is a review of the motives behind one's resorting to spying activity which is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  28
    Technophilic Hubris and Espionage Styles during the Cold War.Kristie Macrakis - 2010 - Isis 101 (2):378-385.
    ABSTRACT During the Cold War the United States developed an espionage style that reflected its love affair with technology (technophilia) whereas the Soviet Union and the East Bloc continued a tradition of using humans to collect intelligence. This essay places the origins and development of these espionage styles during the Cold War in historical and social context, and assesses their strengths and weaknesses by drawing on examples from particular cases. While the United States won the Cold War, the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  18.  76
    Punishing Disloyalty? Treason, Espionage, and the Transgression of Political Boundaries.Youngjae Lee - 2012 - Law and Philosophy 31 (3):299-342.
    This Article examines the idea of betraying or being disloyal to one’s own country as a matter of criminal law. First, the Article defines crimes of disloyalty as involving failures to prioritize one’s own country’s interests through participating in efforts to directly undermine core institutional resources the country requires to protect itself or otherwise advance its interests by force. Second, this Article canvasses various potential arguments for the existence of a duty not to be disloyal to one’s own country and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  19.  41
    (2 other versions)Partly cloudy: ethics in war, espionage, covert action, and interrogation.David L. Perry - 2009 - Lanham, Md.: Scarecrow Press.
    An introduction to ethical reasoning -- Comparative religious perspectives on war -- Just and unjust war in Shakespeare's Henry V -- Anticipating and preventing atrocities in war -- The CIA's original "social contract" -- The KGB: CIA's traditional adversary -- Espionage -- Covert action -- Interrogation -- Concluding reflections.
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  20. Industrial espionage: what you don't know can hurt you.M. J. Stedman - 1991 - Business and Society Review 76:25-32.
     
    Export citation  
     
    Bookmark  
  21.  86
    The ontology of espionage in reality and fiction.Frederik Stjernfelt - 2003 - Sign Systems Studies 31 (1):133-161.
    A basic form of iconicity in literature is the correspondence between basic conceptual schemata in literary semantics on the one hand and in factual treatments on the other. The semantics of a subject like espionage is argued to be dependent on the ontology of the field in question, with reference to the English philosopher Barry Smith’s “fallibilistic apriorism”. This article outlines such an ontology, on the basis of A. J. Greimas’s semiotics and Carl Schmitt’s philosophy of state, claiming that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  22. Extended review of 'Through a Glass Darkly: The Ethics of Espionage and Counter-Intelligence' by Cécile Fabre.Jonathan Parry - 2024 - Mind 133 (532):1211-1220.
    c.4,000 word critical discussion of Fabre's book. Provides an overview of the book plus comments on the themes of (i) loyalty and treason and (ii) the ethics of spying and sex.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  27
    Electricity and Espionage in Eighteenth-Century Italy.Laurence Brockliss - 2009 - Metascience 18 (2):247-249.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  24.  9
    In Denial: Historians, Communism & Espionage.Fraser Ottanelli - 2006 - Science and Society 70 (3):421-423.
  25.  53
    Spying Through a Glass Darkly: The Ethics of Espionage and Counter-Intelligence.Cécile Fabre - 2022 - Oxford University Press.
    Cécile Fabre draws back the curtain on the ethics of espionage and counterintelligence. In a book rich with historical examples she argues that spying is only justified to protect against ongoing violations of fundamental rights. Blackmail, bribery, mass surveillance, cyberespionage, treason, and other nefarious activities are considered.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  26.  33
    Tinker, Tailor, Soldier, Informer: Revisiting the Ethics of Espionage in the Context of Insurgencies and New Wars.Ron Dudai - 2023 - Ethics and International Affairs 37 (2):134-146.
    This essay starts by accepting Cécile Fabre's argument in her book Spying through a Glass Darkly that intelligence work, including using incentives and pressures to encourage betrayal and treason, can be morally justified based on the criteria of necessity, effectiveness, and proportionality. However, while assessments of spying tend to be based on Cold War notions, I explore it here in the messier reality of counterinsurgency, counterterrorism, and “new wars.” In addition, I suggest a methodological expansion: adding a sociological perspective to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  8
    All ears: the aesthetics of espionage.Peter Szendy - 2017 - New York, NY: Fordham University Press.
    An archeology of auditory surveillance combined with an analysis of representations of spying in works of literature, music, and film that provide philosophical reflections on the drives that animate listening: the drive for mastery and the death drive.
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  47
    Reflections on espionage.Harvey Klehr - 2004 - Social Philosophy and Policy 21 (1):141-166.
    In 1995 the United States National Security Agency , the Central Intelligence Agency , and the Federal Bureau of Investigation made public the story of a forty-year American intelligence operation code-named Venona. Shortly after the Nazi-Soviet Pact in 1939, American military intelligence had ordered companies that were sending and receiving coded cables overseas, such as Western Union, to turn over copies to the U.S. government. Hundreds of thousands of cables were sent or received by Soviet government bodies. Beginning in 1943, (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  29
    Elizabethan Espionage: Plotters and Spies in the Struggle between Catholicism and the Crown. By Patrick H. Martin. Pp. 368. Jefferson, North Carolina. McFarland & Company, Inc., 2016, $49.95. [REVIEW]Andrea Campana - 2017 - Heythrop Journal 58 (3):481-484.
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  8
    Espionage, Statecraft and the Theory of Reporting: A Philosophical Theory on Intelligence Management. [REVIEW]Jude P. Dougherty - 2018 - Review of Metaphysics 72 (1).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31. The ethics of espionage.Tony Pfaff & Jeffrey R. Tiel - 2004 - Journal of Military Ethics 3 (1):1-15.
    Professional soldiers and academics have spent considerable effort trying to conclude when it is permissible to set aside the usual moral prohibition against killing in order to achieve the goals set before them. What has received much less attention, however, is when it is appropriate to set aside other moral considerations such as the prohibition against deception, theft and blackmail. This makes some sense, since if it is moral to kill someone, whether or not it is appropriate to deceive him (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  32.  12
    Exploring deceptions: cognitive strategies and dynamics in espionage.Rafael G. Lenzi - 2024 - Semiotica 2024 (260):221-249.
    The paper examines deceptions employed during the Cold War with the purpose of exploring their underlying conceptions, mechanisms, and applications. It focuses on the interactions between the deceiver and the deceived, analyzing both sides’ perspectives. The examination centers on declassified guides, recently published as The Official C.I.A. Manual of Trickery and Deception, which contain detailed instructions concerning how spies should carry out their activities of deception. Three kinds of procedures were selected for analysis: behavior in public for men and women, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  35
    Oracle vs. Microsoft: Corporate Espionage or Competitive Intelligence?Thomas A. Hemphill - 2002 - Business and Society Review 107 (4):501-511.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  40
    Counteracting Global Industrial Espionage: A Damage Control Strategy.A. Coskun Samli & Laurence Jacobs - 2003 - Business and Society Review 108 (1):95-113.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  50
    “Diesem Film liegen Tatsachen zugrunde...” The Narrative of Antifascism and Its Appropriation in the East German Espionage Series Das unsichtbare Visier.Sebastian Haller - 2014 - History of Communism in Europe 5:72-105.
    Since narratives of legitimation have to adapt to shifting discursive environments, they cannot be regarded as static phenomena. To present a sound understanding of their embedment in a specific context, narratives have to be approached from a variety of perspectives – they necessitate, in other words, a “thick description”. This paper addresses the narrative of antifascism as a central element of public discourse throughout the history of the German Democratic Republic and contextualizes it specifically in East German television culture. In (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36.  19
    “Brought up to Live Double Lives”: Intelligence and Espionage as Literary and Philosophical Figures in Ciaran Carson’s Exchange Place and For All We Know.Grzegorz Czemiel - 2021 - Text Matters - a Journal of Literature, Theory and Culture 11:35-50.
    The article examines the figure of the spy—alongside themes related to espionage—as employed in two books by the Northern Irish writer Ciaran Carson : the volume of poems For All We Know and the novel Exchange Place. Carson’s oeuvre is permeated with the Troubles and he has been hailed one of key writers to convey the experience of living in a modern surveillance state. His depiction of Belfast thematizes questions of terrorism, the insecurity and anxiety it causes in everyday (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  16
    Introduction: Probing the Limits of Ethical Espionage.Juan Espindola - 2023 - Ethics and International Affairs 37 (2):113-115.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  26
    Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation.Shannon E. French - 2011 - Journal of Military Ethics 10 (1):74-76.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39. Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
    In this article, I offer an outline of the papers comprising the special issue. I also provide a brief overview of its topic, namely, the friction between cyber security measures and individual rights. I consider such a friction to be a new and exacerbated version of what Mill called ‘the struggle between liberties and authorities,’ and I claim that the struggle arises because of the involvement of public authorities in the management of the cyber sphere, for technological and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  40.  10
    How Should We Think about Espionage?Youngjae Lee - 2024 - Analysis 84 (4):934-945.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  34
    David L. Perry, Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation. Reviewed by.Robert J. Deltete - 2010 - Philosophy in Review 30 (4):293-295.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  63
    Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
    The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  22
    Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation; Religion and the Politics of Peace and Conflict.Paul Martens - 2011 - Journal of the Society of Christian Ethics 31 (1):210-212.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  32
    Cyber-Aggression as an Example of Dysfunctional Behaviour of the Young Generation in the Globalized World.Tomasz Prymak & Tomasz Sosnowski - 2017 - Studies in Logic, Grammar and Rhetoric 52 (1):181-192.
    The objective of this paper is to try to identify the specificity and frequency of cyber-agression as a form of problem behaviour characteristic for the contemporary youth known as Generation Y. Analysis of the results of research conducted among schoolchildren aged 15–16 indicates that cyber-agression is a common phenomenon in the group. It raises the need for reconstruction and re-evaluation of practices and standards developed to date and implemented to address the problematic behaviour of young people through the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  17
    La Dirección de Inteligencia de la Policía de la Provincia de Buenos Aires y el espionaje a la movilización indígena en 19921The Intelligence Boureau of the Police of the Buenos Aires Provinceand espionage of Indigenous mobilization in 1992.Diana Lenton - 2021 - Corpus.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  27
    The Griffin: The Greatest Untold Espionage Story of World War IIArnold Kramish.Anthony Stranges - 1988 - Isis 79 (1):173-174.
  47.  50
    Cyber Trust.Amitai Etzioni - 2019 - Journal of Business Ethics 156 (1):1-13.
    From a sociological and anthropological viewpoint, the ability of complete strangers to carry out transactions that involve significant risk to one or both parties should be complicated by a lack of trust. Yet the rise of e-commerce and “sharing economy” platforms suggests that concerns that seemed prevalent only a few decades ago have been largely assuaged. What mechanisms have been used to facilitate trust between strangers online? Can we measure the extent to which users trust each other when interacting online? (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  48.  7
    : In the Land of Marvels: Science, Fabricated Realities, and Industrial Espionage in the Age of the Grand Tour.Anna Marie Roos - 2024 - Isis 115 (3):660-661.
  49.  38
    Can Cyber‐Physical Systems Reliably Collaborate within a Blockchain?Ben van Lier - 2017 - Metaphilosophy 48 (5):698-711.
    A blockchain can be considered a technological phenomenon that is made up of different interconnected and autonomous systems. Such systems are referred to here as cyber-physical systems: complex interconnections of cyber and physical components. When cyber-physical systems are interconnected, a new whole consisting of a system of systems is created by the autonomous systems and their intercommunication and interaction. In a blockchain, individual systems can independently make decisions on joint information transactions. The decision-making procedures needed for this (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  42
    Cyber Law Terminology as a New Lexical Field in Legal Discourse.Sigita Rackevičienė & Liudmila Mockienė - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):673-687.
    The cyber domain is one of the newest and most rapidly evolving fields of knowledge which has led to the development of a new area of law—cyber law, that regulates the use of the Internet and activities performed over the Internet and other networks. The cyber domain is particularly dynamic: new concepts are constantly developed and need new terminological designations, which in turn need new counterparts in other languages. Formation of these designations and their counterparts often raises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 649