CINXE.COM

Espionage - Wikipedia

<!DOCTYPE html> <html class="client-nojs skin-theme-clientpref-day mf-expand-sections-clientpref-0 mf-font-size-clientpref-small mw-mf-amc-clientpref-0" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Espionage - Wikipedia</title> <script>(function(){var className="client-js skin-theme-clientpref-day mf-expand-sections-clientpref-0 mf-font-size-clientpref-small mw-mf-amc-clientpref-0";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy","wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"0b30ae40-7804-42d4-b052-d609b893f7be","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Espionage","wgTitle":"Espionage","wgCurRevisionId":1280238048,"wgRevisionId":1280238048,"wgArticleId":10501,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Espionage","wgRelevantArticleId":10501,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgRedirectedFrom":"Spy","wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFMode":"stable","wgMFAmc":false,"wgMFAmcOutreachActive":false,"wgMFAmcOutreachUserEligible":false,"wgMFLazyLoadImages":true,"wgMFEditNoticesFeatureConflict":false,"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgMFIsSupportedEditRequest":true,"wgMFScriptPath":"","wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":70000,"wgInternalRedirectTargetUrl":"/wiki/Espionage","wgEditSubmitButtonLabelPublish":true,"wgSectionTranslationMissingLanguages":[{"lang":"ab","autonym":"аԥсшәа","dir":"ltr"},{"lang":"ace","autonym":"Acèh","dir":"ltr"},{"lang":"ady","autonym":"адыгабзэ","dir":"ltr"},{"lang":"als","autonym":"Alemannisch","dir":"ltr"},{"lang":"alt","autonym":"алтай тил","dir":"ltr"},{"lang":"am","autonym":"አማርኛ","dir":"ltr"},{"lang":"ami","autonym":"Pangcah","dir":"ltr"},{"lang":"an","autonym":"aragonés","dir":"ltr"},{"lang":"ang","autonym":"Ænglisc","dir":"ltr"},{"lang":"ann","autonym":"Obolo","dir":"ltr"},{"lang":"anp","autonym":"अंगिका","dir":"ltr"},{"lang":"arc","autonym":"ܐܪܡܝܐ","dir":"rtl"},{"lang":"ary","autonym":"الدارجة","dir":"rtl"},{"lang":"arz","autonym":"مصرى","dir":"rtl"},{"lang":"as","autonym":"অসমীয়া","dir":"ltr"},{"lang":"atj","autonym":"Atikamekw","dir":"ltr"},{"lang":"avk","autonym":"Kotava","dir":"ltr"},{"lang":"av","autonym":"авар","dir":"ltr"},{"lang":"awa","autonym":"अवधी","dir":"ltr"},{"lang":"ay","autonym":"Aymar aru","dir":"ltr"},{"lang":"azb","autonym":"تۆرکجه","dir":"rtl"},{"lang":"ban","autonym":"Basa Bali","dir":"ltr"},{"lang":"bar","autonym":"Boarisch","dir":"ltr"},{"lang":"bbc","autonym":"Batak Toba","dir":"ltr"},{"lang":"bcl","autonym":"Bikol Central","dir":"ltr"},{"lang":"bdr","autonym":"Bajau Sama","dir":"ltr"},{"lang":"bew","autonym":"Betawi","dir":"ltr"},{"lang":"be_x_old","autonym":"","dir":"ltr"},{"lang":"bh","autonym":"भोजपुरी","dir":"ltr"},{"lang":"bi","autonym":"Bislama","dir":"ltr"},{"lang":"bjn","autonym":"Banjar","dir":"ltr"},{"lang":"blk","autonym":"ပအိုဝ်ႏဘာႏသာႏ","dir":"ltr"},{"lang":"bm","autonym":"bamanankan","dir":"ltr"},{"lang":"bpy","autonym":"বিষ্ণুপ্রিয়া মণিপুরী","dir":"ltr"},{"lang":"br","autonym":"brezhoneg","dir":"ltr"},{"lang":"btm","autonym":"Batak Mandailing","dir":"ltr"},{"lang":"bug","autonym":"Basa Ugi","dir":"ltr"},{"lang":"bxr","autonym":"буряад","dir":"ltr"},{"lang":"cbk","autonym":"Chavacano de Zamboanga","dir":"ltr"},{"lang":"cdo","autonym":"閩東語 / Mìng-dĕ̤ng-ngṳ̄","dir":"ltr"},{"lang":"ce","autonym":"нохчийн","dir":"ltr"},{"lang":"ceb","autonym":"Cebuano","dir":"ltr"},{"lang":"ch","autonym":"Chamoru","dir":"ltr"},{"lang":"chr","autonym":"ᏣᎳᎩ","dir":"ltr"},{"lang":"chy","autonym":"Tsetsêhestâhese","dir":"ltr"},{"lang":"co","autonym":"corsu","dir":"ltr"},{"lang":"cr","autonym":"Nēhiyawēwin / ᓀᐦᐃᔭᐍᐏᐣ","dir":"ltr"},{"lang":"crh","autonym":"qırımtatarca","dir":"ltr"},{"lang":"csb","autonym":"kaszëbsczi","dir":"ltr"},{"lang":"cu","autonym":"словѣньскъ / ⰔⰎⰑⰂⰡⰐⰠⰔⰍⰟ","dir":"ltr"},{"lang":"cv","autonym":"чӑвашла","dir":"ltr"},{"lang":"dag","autonym":"dagbanli","dir":"ltr"},{"lang":"dga","autonym":"Dagaare","dir":"ltr"},{"lang":"din","autonym":"Thuɔŋjäŋ","dir":"ltr"},{"lang":"diq","autonym":"Zazaki","dir":"ltr"},{"lang":"dsb","autonym":"dolnoserbski","dir":"ltr"},{"lang":"dtp","autonym":"Kadazandusun","dir":"ltr"},{"lang":"dty","autonym":"डोटेली","dir":"ltr"},{"lang":"dv","autonym":"ދިވެހިބަސް","dir":"rtl"},{"lang":"dz","autonym":"ཇོང་ཁ","dir":"ltr"},{"lang":"ee","autonym":"eʋegbe","dir":"ltr"},{"lang":"eml","autonym":"emiliàn e rumagnòl","dir":"ltr"},{"lang":"ext","autonym":"estremeñu","dir":"ltr"},{"lang":"fat","autonym":"mfantse","dir":"ltr"},{"lang":"ff","autonym":"Fulfulde","dir":"ltr"},{"lang":"fiu_vro","autonym":"","dir":"ltr"},{"lang":"fj","autonym":"Na Vosa Vakaviti","dir":"ltr"},{"lang":"fo","autonym":"føroyskt","dir":"ltr"},{"lang":"fon","autonym":"fɔ̀ngbè","dir":"ltr"},{"lang":"frp","autonym":"arpetan","dir":"ltr"},{"lang":"frr","autonym":"Nordfriisk","dir":"ltr"},{"lang":"fur","autonym":"furlan","dir":"ltr"},{"lang":"fy","autonym":"Frysk","dir":"ltr"},{"lang":"gag","autonym":"Gagauz","dir":"ltr"},{"lang":"gan","autonym":"贛語","dir":"ltr"},{"lang":"gcr","autonym":"kriyòl gwiyannen","dir":"ltr"},{"lang":"gd","autonym":"Gàidhlig","dir":"ltr"},{"lang":"glk","autonym":"گیلکی","dir":"rtl"},{"lang":"gn","autonym":"Avañe'ẽ","dir":"ltr"},{"lang":"gom","autonym":"गोंयची कोंकणी / Gõychi Konknni","dir":"ltr"},{"lang":"gor","autonym":"Bahasa Hulontalo","dir":"ltr"},{"lang":"got","autonym":"𐌲𐌿𐍄𐌹𐍃𐌺","dir":"ltr"},{"lang":"gpe","autonym":"Ghanaian Pidgin","dir":"ltr"},{"lang":"gu","autonym":"ગુજરાતી","dir":"ltr"},{"lang":"guc","autonym":"wayuunaiki","dir":"ltr"},{"lang":"gur","autonym":"farefare","dir":"ltr"},{"lang":"guw","autonym":"gungbe","dir":"ltr"},{"lang":"gv","autonym":"Gaelg","dir":"ltr"},{"lang":"ha","autonym":"Hausa","dir":"ltr"},{"lang":"hak","autonym":"客家語 / Hak-kâ-ngî","dir":"ltr"},{"lang":"haw","autonym":"Hawaiʻi","dir":"ltr"},{"lang":"hif","autonym":"Fiji Hindi","dir":"ltr"},{"lang":"hsb","autonym":"hornjoserbsce","dir":"ltr"},{"lang":"ht","autonym":"Kreyòl ayisyen","dir":"ltr"},{"lang":"hyw","autonym":"Արեւմտահայերէն","dir":"ltr"},{"lang":"ia","autonym":"interlingua","dir":"ltr"},{"lang":"iba","autonym":"Jaku Iban","dir":"ltr"},{"lang":"ie","autonym":"Interlingue","dir":"ltr"},{"lang":"ig","autonym":"Igbo","dir":"ltr"},{"lang":"igl","autonym":"Igala","dir":"ltr"},{"lang":"ik","autonym":"Iñupiatun","dir":"ltr"},{"lang":"ilo","autonym":"Ilokano","dir":"ltr"},{"lang":"inh","autonym":"гӀалгӀай","dir":"ltr"},{"lang":"iu","autonym":"ᐃᓄᒃᑎᑐᑦ / inuktitut","dir":"ltr"},{"lang":"jam","autonym":"Patois","dir":"ltr"},{"lang":"jbo","autonym":"la .lojban.","dir":"ltr"},{"lang":"kaa","autonym":"Qaraqalpaqsha","dir":"ltr"},{"lang":"kab","autonym":"Taqbaylit","dir":"ltr"},{"lang":"kbd","autonym":"адыгэбзэ","dir":"ltr"},{"lang":"kbp","autonym":"Kabɩyɛ","dir":"ltr"},{"lang":"kcg","autonym":"Tyap","dir":"ltr"},{"lang":"kg","autonym":"Kongo","dir":"ltr"},{"lang":"kge","autonym":"Kumoring","dir":"ltr"},{"lang":"ki","autonym":"Gĩkũyũ","dir":"ltr"},{"lang":"kl","autonym":"kalaallisut","dir":"ltr"},{"lang":"km","autonym":"ភាសាខ្មែរ","dir":"ltr"},{"lang":"knc","autonym":"Yerwa Kanuri","dir":"ltr"},{"lang":"koi","autonym":"перем коми","dir":"ltr"},{"lang":"ks","autonym":"कॉशुर / کٲشُر","dir":"rtl"},{"lang":"ksh","autonym":"Ripoarisch","dir":"ltr"},{"lang":"kus","autonym":"Kʋsaal","dir":"ltr"},{"lang":"kv","autonym":"коми","dir":"ltr"},{"lang":"kw","autonym":"kernowek","dir":"ltr"},{"lang":"la","autonym":"Latina","dir":"ltr"},{"lang":"lad","autonym":"Ladino","dir":"ltr"},{"lang":"lbe","autonym":"лакку","dir":"ltr"},{"lang":"lez","autonym":"лезги","dir":"ltr"},{"lang":"lfn","autonym":"Lingua Franca Nova","dir":"ltr"},{"lang":"lg","autonym":"Luganda","dir":"ltr"},{"lang":"li","autonym":"Limburgs","dir":"ltr"},{"lang":"lij","autonym":"Ligure","dir":"ltr"},{"lang":"lld","autonym":"Ladin","dir":"ltr"},{"lang":"lmo","autonym":"lombard","dir":"ltr"},{"lang":"ln","autonym":"lingála","dir":"ltr"},{"lang":"lo","autonym":"ລາວ","dir":"ltr"},{"lang":"ltg","autonym":"latgaļu","dir":"ltr"},{"lang":"lzh","autonym":"文言","dir":"ltr"},{"lang":"mad","autonym":"Madhurâ","dir":"ltr"},{"lang":"mai","autonym":"मैथिली","dir":"ltr"},{"lang":"map-bms","autonym":"Basa Banyumasan","dir":"ltr"},{"lang":"mdf","autonym":"мокшень","dir":"ltr"},{"lang":"mg","autonym":"Malagasy","dir":"ltr"},{"lang":"mhr","autonym":"олык марий","dir":"ltr"},{"lang":"mi","autonym":"Māori","dir":"ltr"},{"lang":"min","autonym":"Minangkabau","dir":"ltr"},{"lang":"ml","autonym":"മലയാളം","dir":"ltr"},{"lang":"mni","autonym":"ꯃꯤꯇꯩ ꯂꯣꯟ","dir":"ltr"},{"lang":"mnw","autonym":"ဘာသာမန်","dir":"ltr"},{"lang":"mos","autonym":"moore","dir":"ltr"},{"lang":"mr","autonym":"मराठी","dir":"ltr"},{"lang":"mrj","autonym":"кырык мары","dir":"ltr"},{"lang":"mt","autonym":"Malti","dir":"ltr"},{"lang":"mwl","autonym":"Mirandés","dir":"ltr"},{"lang":"my","autonym":"မြန်မာဘာသာ","dir":"ltr"},{"lang":"myv","autonym":"эрзянь","dir":"ltr"},{"lang":"mzn","autonym":"مازِرونی","dir":"rtl"},{"lang":"nah","autonym":"Nāhuatl","dir":"ltr"},{"lang":"nan","autonym":"閩南語 / Bân-lâm-gú","dir":"ltr"},{"lang":"nap","autonym":"Napulitano","dir":"ltr"},{"lang":"nds","autonym":"Plattdüütsch","dir":"ltr"},{"lang":"ne","autonym":"नेपाली","dir":"ltr"},{"lang":"new","autonym":"नेपाल भाषा","dir":"ltr"},{"lang":"nia","autonym":"Li Niha","dir":"ltr"},{"lang":"nov","autonym":"Novial","dir":"ltr"},{"lang":"nqo","autonym":"ߒߞߏ","dir":"rtl"},{"lang":"nr","autonym":"isiNdebele seSewula","dir":"ltr"},{"lang":"nrm","autonym":"Nouormand","dir":"ltr"},{"lang":"nso","autonym":"Sesotho sa Leboa","dir":"ltr"},{"lang":"nv","autonym":"Diné bizaad","dir":"ltr"},{"lang":"ny","autonym":"Chi-Chewa","dir":"ltr"},{"lang":"oc","autonym":"occitan","dir":"ltr"},{"lang":"olo","autonym":"livvinkarjala","dir":"ltr"},{"lang":"om","autonym":"Oromoo","dir":"ltr"},{"lang":"or","autonym":"ଓଡ଼ିଆ","dir":"ltr"},{"lang":"os","autonym":"ирон","dir":"ltr"},{"lang":"pa","autonym":"ਪੰਜਾਬੀ","dir":"ltr"},{"lang":"pag","autonym":"Pangasinan","dir":"ltr"},{"lang":"pam","autonym":"Kapampangan","dir":"ltr"},{"lang":"pap","autonym":"Papiamentu","dir":"ltr"},{"lang":"pcd","autonym":"Picard","dir":"ltr"},{"lang":"pcm","autonym":"Naijá","dir":"ltr"},{"lang":"pdc","autonym":"Deitsch","dir":"ltr"},{"lang":"pfl","autonym":"Pälzisch","dir":"ltr"},{"lang":"pi","autonym":"पालि","dir":"ltr"},{"lang":"pih","autonym":"Norfuk / Pitkern","dir":"ltr"},{"lang":"pms","autonym":"Piemontèis","dir":"ltr"},{"lang":"pnt","autonym":"Ποντιακά","dir":"ltr"},{"lang":"ps","autonym":"پښتو","dir":"rtl"},{"lang":"pwn","autonym":"pinayuanan","dir":"ltr"},{"lang":"qu","autonym":"Runa Simi","dir":"ltr"},{"lang":"rm","autonym":"rumantsch","dir":"ltr"},{"lang":"rmy","autonym":"romani čhib","dir":"ltr"},{"lang":"rn","autonym":"ikirundi","dir":"ltr"},{"lang":"rsk","autonym":"руски","dir":"ltr"},{"lang":"roa_tara","autonym":"","dir":"ltr"},{"lang":"rup","autonym":"armãneashti","dir":"ltr"},{"lang":"rue","autonym":"русиньскый","dir":"ltr"},{"lang":"rw","autonym":"Ikinyarwanda","dir":"ltr"},{"lang":"sa","autonym":"संस्कृतम्","dir":"ltr"},{"lang":"sat","autonym":"ᱥᱟᱱᱛᱟᱲᱤ","dir":"ltr"},{"lang":"sc","autonym":"sardu","dir":"ltr"},{"lang":"se","autonym":"davvisámegiella","dir":"ltr"},{"lang":"sg","autonym":"Sängö","dir":"ltr"},{"lang":"sgs","autonym":"žemaitėška","dir":"ltr"},{"lang":"shi","autonym":"Taclḥit","dir":"ltr"},{"lang":"shn","autonym":"တႆး","dir":"ltr"},{"lang":"si","autonym":"සිංහල","dir":"ltr"},{"lang":"skr","autonym":"سرائیکی","dir":"rtl"},{"lang":"sm","autonym":"Gagana Samoa","dir":"ltr"},{"lang":"smn","autonym":"anarâškielâ","dir":"ltr"},{"lang":"sn","autonym":"chiShona","dir":"ltr"},{"lang":"so","autonym":"Soomaaliga","dir":"ltr"},{"lang":"srn","autonym":"Sranantongo","dir":"ltr"},{"lang":"ss","autonym":"SiSwati","dir":"ltr"},{"lang":"st","autonym":"Sesotho","dir":"ltr"},{"lang":"stq","autonym":"Seeltersk","dir":"ltr"},{"lang":"su","autonym":"Sunda","dir":"ltr"},{"lang":"sw","autonym":"Kiswahili","dir":"ltr"},{"lang":"syl","autonym":"ꠍꠤꠟꠐꠤ","dir":"ltr"},{"lang":"szl","autonym":"ślůnski","dir":"ltr"},{"lang":"szy","autonym":"Sakizaya","dir":"ltr"},{"lang":"ta","autonym":"தமிழ்","dir":"ltr"},{"lang":"tay","autonym":"Tayal","dir":"ltr"},{"lang":"tcy","autonym":"ತುಳು","dir":"ltr"},{"lang":"tdd","autonym":"ᥖᥭᥰ ᥖᥬᥲ ᥑᥨᥒᥰ","dir":"ltr"},{"lang":"tet","autonym":"tetun","dir":"ltr"},{"lang":"tg","autonym":"тоҷикӣ","dir":"ltr"},{"lang":"ti","autonym":"ትግርኛ","dir":"ltr"},{"lang":"tig","autonym":"ትግሬ","dir":"ltr"},{"lang":"tk","autonym":"Türkmençe","dir":"ltr"},{"lang":"tly","autonym":"tolışi","dir":"ltr"},{"lang":"tn","autonym":"Setswana","dir":"ltr"},{"lang":"to","autonym":"lea faka-Tonga","dir":"ltr"},{"lang":"tpi","autonym":"Tok Pisin","dir":"ltr"},{"lang":"trv","autonym":"Seediq","dir":"ltr"},{"lang":"ts","autonym":"Xitsonga","dir":"ltr"},{"lang":"tt","autonym":"татарча / tatarça","dir":"ltr"},{"lang":"tum","autonym":"chiTumbuka","dir":"ltr"},{"lang":"tw","autonym":"Twi","dir":"ltr"},{"lang":"ty","autonym":"reo tahiti","dir":"ltr"},{"lang":"tyv","autonym":"тыва дыл","dir":"ltr"},{"lang":"udm","autonym":"удмурт","dir":"ltr"},{"lang":"ug","autonym":"ئۇيغۇرچە / Uyghurche","dir":"rtl"},{"lang":"ve","autonym":"Tshivenda","dir":"ltr"},{"lang":"vec","autonym":"vèneto","dir":"ltr"},{"lang":"vep","autonym":"vepsän kel’","dir":"ltr"},{"lang":"vls","autonym":"West-Vlams","dir":"ltr"},{"lang":"vo","autonym":"Volapük","dir":"ltr"},{"lang":"wa","autonym":"walon","dir":"ltr"},{"lang":"wg_en","autonym":"","dir":"ltr"},{"lang":"wo","autonym":"Wolof","dir":"ltr"},{"lang":"xal","autonym":"хальмг","dir":"ltr"},{"lang":"xh","autonym":"isiXhosa","dir":"ltr"},{"lang":"xmf","autonym":"მარგალური","dir":"ltr"},{"lang":"yo","autonym":"Yorùbá","dir":"ltr"},{"lang":"za","autonym":"Vahcuengh","dir":"ltr"},{"lang":"zea","autonym":"Zeêuws","dir":"ltr"},{"lang":"zgh","autonym":"ⵜⴰⵎⴰⵣⵉⵖⵜ ⵜⴰⵏⴰⵡⴰⵢⵜ","dir":"ltr"},{"lang":"zh_yue","autonym":"","dir":"ltr"},{"lang":"zu","autonym":"isiZulu","dir":"ltr"}],"wgSectionTranslationTargetLanguages":["ab","ace","ady","af","als","alt","am","ami","an","ang","ann","anp","ar","arc","ary","arz","as","ast","atj","avk","av","awa","ay","az","azb","ba","ban","bar","bbc","bcl","bdr","be","bew","be_x_old","bg","bh","bi","bjn","blk","bm","bn","bo","bpy","br","bs","btm","bug","bxr","ca","cbk","cdo","ce","ceb","ch","chr","chy","ckb","co","cr","crh","cs","csb","cu","cv","cy","da","dag","de","dga","din","diq","dsb","dtp","dty","dv","dz","ee","el","eml","en","eo","es","et","eu","ext","fa","fat","ff","fi","fiu_vro","fj","fo","fon","fr","frp","frr","fur","fy","ga","gag","gan","gcr","gd","gl","glk","gn","gom","gor","got","gpe","gu","guc","gur","guw","gv","ha","hak","haw","he","hi","hif","hr","hsb","ht","hu","hy","hyw","ia","iba","id","ie","ig","igl","ik","ilo","inh","io","is","it","iu","ja","jam","jbo","jv","ka","kaa","kab","kbd","kbp","kcg","kg","kge","ki","kk","kl","km","kn","knc","ko","koi","krc","ks","ksh","ku","kus","kv","kw","ky","la","lad","lb","lbe","lez","lfn","lg","li","lij","lld","lmo","ln","lo","lt","ltg","lv","lzh","mad","mai","map-bms","mdf","mg","mhr","mi","min","mk","ml","mn","mni","mnw","mos","mr","mrj","ms","mt","mwl","my","myv","mzn","nah","nan","nap","nds","nds-nl","ne","new","nia","nl","nn","no","nov","nqo","nr","nrm","nso","nv","ny","oc","olo","om","or","os","pa","pag","pam","pap","pcd","pcm","pdc","pfl","pi","pih","pl","pms","pnb","pnt","ps","pt","pwn","qu","rm","rmy","rn","rsk","ro","roa_tara","rup","rue","ru","rw","sa","sah","sat","sc","scn","sco","sd","se","sg","sgs","sh","shi","shn","si","simple","sk","skr","sl","sm","smn","sn","so","sq","sr","srn","ss","st","stq","su","sv","sw","syl","szl","szy","ta","tay","tcy","tdd","te","tet","tg","th","ti","tig","tk","tl","tly","tn","to","tpi","tr","trv","ts","tt","tum","tw","ty","tyv","udm","ug","uk","ur","uz","ve","vec","vep","vi","vls","vo","wa","war","wg_en","wo","wuu","xal","xh","xmf","yi","yo","za","zea","zgh","zh","zh_yue","zu"],"isLanguageSearcherCXEntrypointEnabled":true,"mintEntrypointLanguages":null,"wgWikibaseItemId":"Q165950","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGELevelingUpEnabledForUser":false,"wgMinervaPermissions":{"watchable":true,"watch":false},"wgMinervaFeatures":{"beta":false,"donateBanner":true,"donate":false,"mobileOptionsLink":true,"categories":false,"pageIssues":true,"talkAtTop":true,"historyInPageActions":false,"overflowSubmenu":false,"tabsOnSpecials":true,"personalMenu":false,"mainMenuExpanded":false,"echo":true,"nightMode":true},"wgMinervaDownloadNamespaces":[0]}; RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.minerva.styles":"ready","skins.minerva.content.styles.images":"ready","mediawiki.hlist":"ready","skins.minerva.codex.styles":"ready","skins.minerva.icons":"ready","skins.minerva.amc.styles":"ready","ext.wikimediamessages.styles":"ready","mobile.init.styles":"ready","ext.relatedArticles.styles":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["mediawiki.action.view.redirect","ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","skins.minerva.scripts","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","ext.popups","mobile.init","ext.echo.centralauth","ext.relatedArticles.readMore.bootstrap","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.cx.eventlogging.campaigns","ext.cx.entrypoints.mffrequentlanguages","ext.cx.entrypoints.languagesearcher.init","mw.externalguidance.init","ext.checkUser.clientHints","ext.quicksurveys.init","ext.growthExperiments.SuggestedEditSession"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.relatedArticles.styles%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cmediawiki.hlist%7Cmobile.init.styles%7Cskins.minerva.amc.styles%7Cskins.minerva.codex.styles%7Cskins.minerva.content.styles.images%7Cskins.minerva.icons%2Cstyles%7Cwikibase.client.init&amp;only=styles&amp;skin=minerva"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=minerva"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=minerva"> <meta name="generator" content="MediaWiki 1.44.0-wmf.22"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="theme-color" content="#eaecf0"> <meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=yes, minimum-scale=0.25, maximum-scale=5.0"> <meta property="og:title" content="Espionage - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="manifest" href="/w/api.php?action=webapp-manifest"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Espionage&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Espionage"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="login.wikimedia.org"> </head> <body class="mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Espionage rootpage-Espionage stable issues-group-B skin-minerva action-view skin--responsive mw-mf-amc-disabled mw-mf"><div id="mw-mf-viewport"> <div id="mw-mf-page-center"> <a class="mw-mf-page-center__mask" href="#"></a> <header class="header-container header-chrome"> <div class="minerva-header"> <nav class="navigation-drawer toggle-list view-border-box"> <input type="checkbox" id="main-menu-input" data-event-name="ui.mainmenu" class="toggle-list__checkbox" role="button" aria-haspopup="true" aria-expanded="false" aria-labelledby="mw-mf-main-menu-button"> <label for="main-menu-input" id="mw-mf-main-menu-button" aria-hidden="true" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet toggle-list__toggle"> <span class="minerva-icon minerva-icon--menu"></span> <span></span> </label> <div id="mw-mf-page-left" class="menu view-border-box"> <ul id="p-navigation" class="toggle-list__list"> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--home" href="/wiki/Main_Page" data-mw="interface"> <span class="minerva-icon minerva-icon--home"></span> <span class="toggle-list-item__label">Home</span> </a> </li> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--random" href="/wiki/Special:Random" data-mw="interface"> <span class="minerva-icon minerva-icon--die"></span> <span class="toggle-list-item__label">Random</span> </a> </li> <li class="toggle-list-item skin-minerva-list-item-jsonly"> <a class="toggle-list-item__anchor menu__item--nearby" href="/wiki/Special:Nearby" data-event-name="menu.nearby" data-mw="interface"> <span class="minerva-icon minerva-icon--mapPin"></span> <span class="toggle-list-item__label">Nearby</span> </a> </li> </ul> <ul id="p-personal" class="toggle-list__list"> <li class="toggle-list-item "> <a class="toggle-list-item__anchor mw-list-item menu__item--login" href="/w/index.php?title=Special:UserLogin&amp;returnto=Espionage" data-event-name="menu.login" data-mw="interface"> <span class="minerva-icon minerva-icon--logIn"></span> <span class="toggle-list-item__label">Log in</span> </a> </li> </ul> <ul id="pt-preferences" class="toggle-list__list"> <li class="toggle-list-item skin-minerva-list-item-jsonly"> <a class="toggle-list-item__anchor menu__item--settings" href="/w/index.php?title=Special:MobileOptions&amp;returnto=Espionage" data-event-name="menu.settings" data-mw="interface"> <span class="minerva-icon minerva-icon--settings"></span> <span class="toggle-list-item__label">Settings</span> </a> </li> </ul> <div class="donate-banner"> <a href="https://donate.wikimedia.org/?wmf_source=donate&amp;wmf_medium=sidebar&amp;wmf_campaign=en.wikipedia.org&amp;uselang=en" class="donate-banner__link" data-event-name="menu.donateBanner"> <div class="donate-banner__text-container"> <span class="donate-banner__text">Donate Now</span> <span class="donate-banner__subtitle">If Wikipedia is useful to you, please give today.</span> </div> <picture> <source srcset="https://en.wikipedia.org/static/images/donate/donate.png" media="(prefers-reduced-motion)" /> <img src="https://en.wikipedia.org/static/images/donate/donate.gif" alt="" class="donate-banner__gif" loading="lazy"> </picture> </a> </div> <ul class="hlist"> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--about" href="/wiki/Wikipedia:About" data-mw="interface"> <span class="toggle-list-item__label">About Wikipedia</span> </a> </li> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--disclaimers" href="/wiki/Wikipedia:General_disclaimer" data-mw="interface"> <span class="toggle-list-item__label">Disclaimers</span> </a> </li> </ul> </div> <label class="main-menu-mask" for="main-menu-input"></label> </nav> <div class="branding-box"> <a href="/wiki/Main_Page"> <span><img src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" alt="Wikipedia" width="120" height="18" style="width: 7.5em; height: 1.125em;"/> </span> </a> </div> <form action="/w/index.php" method="get" class="minerva-search-form"> <div class="search-box"> <input type="hidden" name="title" value="Special:Search"/> <input class="search skin-minerva-search-trigger" id="searchInput" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f"> <span class="search-box-icon-overlay"><span class="minerva-icon minerva-icon--search"></span> </span> </div> <button id="searchIcon" class="cdx-button cdx-button--size-large cdx-button--icon-only cdx-button--weight-quiet skin-minerva-search-trigger"> <span class="minerva-icon minerva-icon--search"></span> <span>Search</span> </button> </form> <nav class="minerva-user-navigation" aria-label="User navigation"> </nav> </div> </header> <main id="content" class="mw-body"> <div class="banner-container"> <div id="siteNotice"></div> </div> <div class="pre-content heading-holder"> <div class="page-heading"> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Espionage</span></h1> <div class="tagline"></div> </div> <ul id="p-associated-pages" class="minerva__tab-container"> <li class="minerva__tab selected mw-list-item"> <a class="minerva__tab-text" href="/wiki/Espionage" rel="" data-event-name="tabs.main">Article</a> </li> <li class="minerva__tab mw-list-item"> <a class="minerva__tab-text" href="/wiki/Talk:Espionage" rel="discussion" data-event-name="tabs.talk">Talk</a> </li> </ul> <nav class="page-actions-menu"> <ul id="p-views" class="page-actions-menu__list minerva-icon-only-menu"> <li id="language-selector" class="page-actions-menu__list-item"> <a role="button" href="#p-lang" data-mw="interface" data-event-name="menu.languages" title="Language" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet language-selector"> <span class="minerva-icon minerva-icon--language"></span> <span>Language</span> </a> </li> <li id="page-actions-watch" class="page-actions-menu__list-item"> <a role="button" id="ca-watch" href="/w/index.php?title=Special:UserLogin&amp;returnto=Espionage" data-event-name="menu.watch" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet menu__item--page-actions-watch"> <span class="minerva-icon minerva-icon--star"></span> <span>Watch</span> </a> </li> <li id="page-actions-edit" class="page-actions-menu__list-item"> <a role="button" id="ca-edit" href="/w/index.php?title=Espionage&amp;action=edit" data-event-name="menu.edit" data-mw="interface" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet edit-page menu__item--page-actions-edit"> <span class="minerva-icon minerva-icon--edit"></span> <span>Edit</span> </a> </li> </ul> </nav> <!-- version 1.0.2 (change every time you update a partial) --> <div id="mw-content-subtitle"><span class="mw-redirectedfrom">(Redirected from <a href="/w/index.php?title=Spy&amp;redirect=no" class="mw-redirect" title="Spy">Spy</a>)</span></div> </div> <div id="bodyContent" class="content"> <div id="mw-content-text" class="mw-body-content"><script>function mfTempOpenSection(id){var block=document.getElementById("mf-section-"+id);block.className+=" open-block";block.previousSibling.className+=" open-block";}</script><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><section class="mf-section-0" id="mf-section-0"> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">For other uses, see <a href="/wiki/Espionage_(disambiguation)" class="mw-disambig" title="Espionage (disambiguation)">Espionage (disambiguation)</a>.</div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable"><span>"Spy" and "Secret agent" redirect here. For other uses, see <a href="/wiki/Spy_(disambiguation)" class="mw-disambig" title="Spy (disambiguation)">Spy (disambiguation)</a> and <a href="/wiki/Secret_agent_(disambiguation)" class="mw-redirect mw-disambig" title="Secret agent (disambiguation)">Secret agent (disambiguation)</a>.</span></div> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-Globalize plainlinks metadata ambox ambox-content ambox-globalize" role="presentation"><tbody><tr><td class="mbox-text"><div class="mbox-text-span">The examples and perspective in this article <b>deal primarily with the United States and do not represent a <a href="/wiki/Wikipedia:WikiProject_Countering_systemic_bias" title="Wikipedia:WikiProject Countering systemic bias">worldwide view</a> of the subject</b>.<span class="hide-when-compact"> You may <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Espionage&amp;action=edit">improve this article</a>, discuss the issue on the <a href="/wiki/Talk:Espionage" title="Talk:Espionage">talk page</a>, or <a href="/wiki/Wikipedia:Article_wizard" title="Wikipedia:Article wizard">create a new article</a>, as appropriate.</span> <span class="date-container"><i>(<span class="date">February 2019</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1246091330">.mw-parser-output .sidebar{width:22em;float:right;clear:right;margin:0.5em 0 1em 1em;background:var(--background-color-neutral-subtle,#f8f9fa);border:1px solid var(--border-color-base,#a2a9b1);padding:0.2em;text-align:center;line-height:1.4em;font-size:88%;border-collapse:collapse;display:table}body.skin-minerva .mw-parser-output .sidebar{display:table!important;float:right!important;margin:0.5em 0 1em 1em!important}.mw-parser-output .sidebar-subgroup{width:100%;margin:0;border-spacing:0}.mw-parser-output .sidebar-left{float:left;clear:left;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-none{float:none;clear:both;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-outer-title{padding:0 0.4em 0.2em;font-size:125%;line-height:1.2em;font-weight:bold}.mw-parser-output .sidebar-top-image{padding:0.4em}.mw-parser-output .sidebar-top-caption,.mw-parser-output .sidebar-pretitle-with-top-image,.mw-parser-output .sidebar-caption{padding:0.2em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-pretitle{padding:0.4em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-title,.mw-parser-output .sidebar-title-with-pretitle{padding:0.2em 0.8em;font-size:145%;line-height:1.2em}.mw-parser-output .sidebar-title-with-pretitle{padding:0.1em 0.4em}.mw-parser-output .sidebar-image{padding:0.2em 0.4em 0.4em}.mw-parser-output .sidebar-heading{padding:0.1em 0.4em}.mw-parser-output .sidebar-content{padding:0 0.5em 0.4em}.mw-parser-output .sidebar-content-with-subgroup{padding:0.1em 0.4em 0.2em}.mw-parser-output .sidebar-above,.mw-parser-output .sidebar-below{padding:0.3em 0.8em;font-weight:bold}.mw-parser-output .sidebar-collapse .sidebar-above,.mw-parser-output .sidebar-collapse .sidebar-below{border-top:1px solid #aaa;border-bottom:1px solid #aaa}.mw-parser-output .sidebar-navbar{text-align:right;font-size:115%;padding:0 0.4em 0.4em}.mw-parser-output .sidebar-list-title{padding:0 0.4em;text-align:left;font-weight:bold;line-height:1.6em;font-size:105%}.mw-parser-output .sidebar-list-title-c{padding:0 0.4em;text-align:center;margin:0 3.3em}@media(max-width:640px){body.mediawiki .mw-parser-output .sidebar{width:100%!important;clear:both;float:none!important;margin-left:0!important;margin-right:0!important}}body.skin--responsive .mw-parser-output .sidebar a>img{max-width:none!important}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media print{body.ns-0 .mw-parser-output .sidebar{display:none!important}}</style><style data-mw-deduplicate="TemplateStyles:r1202158006">.mw-parser-output .law-sidebar .sidebar-heading{background:#aaddff;color:#000}.mw-parser-output .law-sidebar .sidebar-above{font-weight:normal}.mw-parser-output .law-sidebar .sidebar-below{padding:0.4em;border-top:1px #aaa solid;font-weight:normal;font-size:smaller}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1246091330"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1202158006"> <p><b>Espionage</b>, <b>spying</b>, or <b>intelligence gathering</b> is the act of obtaining secret or <a href="/wiki/Confidentiality" title="Confidentiality">confidential information</a> (<a href="/wiki/Intelligence_assessment" title="Intelligence assessment">intelligence</a>). A person who commits espionage is called an <i><b>espionage agent</b></i> or <i><b>spy</b></i>.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> Any individual or spy ring (a cooperating group of spies), in the service of a <a href="/wiki/Government" title="Government">government</a>, <a href="/wiki/Company" title="Company">company</a>, <a href="/wiki/Criminal_organization" class="mw-redirect" title="Criminal organization">criminal organization</a>, or independent operation, can commit espionage. The practice is <a href="/wiki/Clandestine_operation" title="Clandestine operation">clandestine</a>, as it is by definition unwelcome. In some circumstances, it may be a legal tool of <a href="/wiki/Law_enforcement" title="Law enforcement">law enforcement</a> and in others, it may be <a href="/wiki/Crime" title="Crime">illegal</a> and punishable by law. </p><p>Espionage is often part of an institutional effort by a government or commercial concern. However, the term tends to be associated with state spying on potential or actual enemies for <a href="/wiki/Military_intelligence" title="Military intelligence">military</a> purposes. Spying involving <a href="/wiki/Corporation" title="Corporation">corporations</a> is known as <a href="/wiki/Corporate_espionage" class="mw-redirect" title="Corporate espionage">Corporate espionage</a>. </p><p>One way to gather data and information about a targeted organization is by infiltrating its ranks. Spies can then return information such as the size and strength of <a href="/wiki/Enemy_force" class="mw-redirect" title="Enemy force">enemy forces</a>. They can also find <a href="/wiki/Dissident" title="Dissident">dissidents</a> within the organization and influence them to provide further information or to defect.<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> In times of crisis, spies steal technology and <a href="/wiki/Sabotage" title="Sabotage">sabotage</a> the enemy in various ways. <a href="/wiki/Counterintelligence" title="Counterintelligence">Counterintelligence</a> is the practice of thwarting enemy espionage and intelligence-gathering. Almost all <a href="/wiki/Sovereign_state" title="Sovereign state">sovereign states</a> have strict laws concerning espionage, including those who practice espionage in other countries, and the penalties for being caught are often severe. </p> <div id="toc" class="toc" role="navigation" aria-labelledby="mw-toc-heading"><input type="checkbox" role="button" id="toctogglecheckbox" class="toctogglecheckbox" style="display:none"><div class="toctitle" lang="en" dir="ltr"><h2 id="mw-toc-heading">Contents</h2><span class="toctogglespan"><label class="toctogglelabel" for="toctogglecheckbox"></label></span></div> <ul> <li class="toclevel-1 tocsection-1"><a href="#The_problem_of_defining_intelligence_and_espionage"><span class="tocnumber">1</span> <span class="toctext">The problem of defining intelligence and espionage</span></a></li> <li class="toclevel-1 tocsection-2"><a href="#History"><span class="tocnumber">2</span> <span class="toctext">History</span></a> <ul> <li class="toclevel-2 tocsection-3"><a href="#Ancient_world"><span class="tocnumber">2.1</span> <span class="toctext">Ancient world</span></a></li> <li class="toclevel-2 tocsection-4"><a href="#Middle_Ages"><span class="tocnumber">2.2</span> <span class="toctext">Middle Ages</span></a></li> <li class="toclevel-2 tocsection-5"><a href="#The_Renaissance"><span class="tocnumber">2.3</span> <span class="toctext">The Renaissance</span></a></li> <li class="toclevel-2 tocsection-6"><a href="#United_States"><span class="tocnumber">2.4</span> <span class="toctext">United States</span></a></li> <li class="toclevel-2 tocsection-7"><a href="#World_War_I,_World_War_II"><span class="tocnumber">2.5</span> <span class="toctext">World War I, World War II</span></a></li> <li class="toclevel-2 tocsection-8"><a href="#Cold_War"><span class="tocnumber">2.6</span> <span class="toctext">Cold War</span></a></li> </ul> </li> <li class="toclevel-1 tocsection-9"><a href="#Modern_day"><span class="tocnumber">3</span> <span class="toctext">Modern day</span></a></li> <li class="toclevel-1 tocsection-10"><a href="#Targets_of_espionage"><span class="tocnumber">4</span> <span class="toctext">Targets of espionage</span></a></li> <li class="toclevel-1 tocsection-11"><a href="#Methods_and_terminology"><span class="tocnumber">5</span> <span class="toctext">Methods and terminology</span></a> <ul> <li class="toclevel-2 tocsection-12"><a href="#How_the_United_States_defines_espionage"><span class="tocnumber">5.1</span> <span class="toctext">How the United States defines espionage</span></a></li> <li class="toclevel-2 tocsection-13"><a href="#Technology_and_techniques"><span class="tocnumber">5.2</span> <span class="toctext">Technology and techniques</span></a></li> </ul> </li> <li class="toclevel-1 tocsection-14"><a href="#Organization"><span class="tocnumber">6</span> <span class="toctext">Organization</span></a></li> <li class="toclevel-1 tocsection-15"><a href="#Industrial_espionage"><span class="tocnumber">7</span> <span class="toctext">Industrial espionage</span></a></li> <li class="toclevel-1 tocsection-16"><a href="#Agents_in_espionage"><span class="tocnumber">8</span> <span class="toctext">Agents in espionage</span></a></li> <li class="toclevel-1 tocsection-17"><a href="#Law"><span class="tocnumber">9</span> <span class="toctext">Law</span></a> <ul> <li class="toclevel-2 tocsection-18"><a href="#Espionage_law_in_the_United_States"><span class="tocnumber">9.1</span> <span class="toctext">Espionage law in the United States</span></a></li> <li class="toclevel-2 tocsection-19"><a href="#Use_against_non-spies"><span class="tocnumber">9.2</span> <span class="toctext">Use against non-spies</span></a></li> <li class="toclevel-2 tocsection-20"><a href="#Espionage_law_in_the_UK"><span class="tocnumber">9.3</span> <span class="toctext">Espionage law in the UK</span></a> <ul> <li class="toclevel-3 tocsection-21"><a href="#Government_intelligence_law_and_its_distinction_from_espionage"><span class="tocnumber">9.3.1</span> <span class="toctext">Government intelligence law and its distinction from espionage</span></a></li> </ul> </li> <li class="toclevel-2 tocsection-22"><a href="#Military_intelligence_and_military_justice"><span class="tocnumber">9.4</span> <span class="toctext">Military intelligence and military justice</span></a></li> </ul> </li> <li class="toclevel-1 tocsection-23"><a href="#Spy_fiction"><span class="tocnumber">10</span> <span class="toctext">Spy fiction</span></a></li> <li class="toclevel-1 tocsection-24"><a href="#See_also"><span class="tocnumber">11</span> <span class="toctext">See also</span></a></li> <li class="toclevel-1 tocsection-25"><a href="#References"><span class="tocnumber">12</span> <span class="toctext">References</span></a> <ul> <li class="toclevel-2 tocsection-26"><a href="#Citations"><span class="tocnumber">12.1</span> <span class="toctext">Citations</span></a></li> <li class="toclevel-2 tocsection-27"><a href="#Works_cited"><span class="tocnumber">12.2</span> <span class="toctext">Works cited</span></a></li> </ul> </li> <li class="toclevel-1 tocsection-28"><a href="#Further_reading"><span class="tocnumber">13</span> <span class="toctext">Further reading</span></a></li> <li class="toclevel-1 tocsection-29"><a href="#External_links"><span class="tocnumber">14</span> <span class="toctext">External links</span></a></li> </ul> </div> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(1)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="The_problem_of_defining_intelligence_and_espionage">The problem of defining intelligence and espionage</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=1" title="Edit section: The problem of defining intelligence and espionage" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-1 collapsible-block" id="mf-section-1"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Intelligence_studies" title="Intelligence studies">Intelligence studies</a></div><p>The <i>original</i> definition of intelligence (in English) was as to be synonymous with <a href="/wiki/Journalism" title="Journalism">journalism</a> and <a href="/wiki/News" title="News">news</a>, and has morphed and transformed into whatever uses it has today.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> <style data-mw-deduplicate="TemplateStyles:r1244412712">.mw-parser-output .templatequote{overflow:hidden;margin:1em 0;padding:0 32px}.mw-parser-output .templatequotecite{line-height:1.5em;text-align:left;margin-top:0}@media(min-width:500px){.mw-parser-output .templatequotecite{padding-left:1.6em}}</style></p><blockquote class="templatequote"><div class="poem"> <p>"Here it is up front: intelligence is, with thanks to Constantine FitzGibbon, knowledge of the enemy. No sooner is it written than the readers' rejoinders flash in the mind, form on the lips, strike the air: No, it's wrong, inadequate, misleading, or impolitic; or, So, what else is new?<br> <br> Rest assured, dear rejoinder-ers, that these objections will be handled long before the last page is reached... so many of those intelligencers who have tried to define intelligence have grievously botched the job. Finally, unless intelligence is properly understood, the country's intelligence agencies, faced with changing targets and priorities, may lose sight of their proper task." </p> </div><div class="templatequotecite">— <cite>Thomas F. Troy, The "Correct" Definition of Intelligence</cite></div></blockquote> <p>That modern definition of intelligence as "knowledge of the enemy" is considered problematic.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> Scholars argue that it does not include any sort of inclusion of who gathers intelligence and for what purpose.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> Can police detectives, inspectors, or federal agents be considered as gathering intelligence? In which case, what is the difference between a spy and a detective?<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> Who is the enemy?<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><div class="poem"> <p>"The debate within <a href="/wiki/Intelligence_studies" title="Intelligence studies">Intelligence studies</a> over its central conceptual term is by no means a discipline-specific problem. <a href="/wiki/International_security" title="International security">International security</a> experts have debated the term “<a href="/wiki/Terrorism" title="Terrorism">terrorism</a>” ad nauseam, while <a href="/wiki/Biologists" class="mw-redirect" title="Biologists">biologists</a> have been at war over the term “<a href="/wiki/Species" title="Species">species</a>” for over two centuries. In contrast to these parallel debates over the respective essences of “terrorism” or “species”, scholars of intelligence add that intelligence is under-theorized. In short, they posit the following: if we think harder we could get a better, more functional, definition of intelligence." </p> </div><div class="templatequotecite">— <cite>Jules J.S. Gaspard, Intelligence without Essence: Rejecting the Classical Theory of Definition</cite></div></blockquote> <p>For centuries, there has been no single definition of intelligence, nor indeed espionage.<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> The definition depends on the <a href="/wiki/Scholar" title="Scholar">scholar</a>, the practitioner, the <a href="/wiki/Government" title="Government">government</a>, the <a href="/wiki/Citizenship" title="Citizenship">citizen</a>, or any of the other <a href="/wiki/Stakeholder_analysis" title="Stakeholder analysis">stakeholders</a> who might be making remarks upon the practices of spies or <a href="/wiki/Intelligence_agency" title="Intelligence agency">intelligence agencies</a>.<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> Some scholars have written that the definition of intelligence is confused by the fact that intelligence agencies today are engaged in many more activities than intelligence gathering,<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> and ask whether <a href="/wiki/Sabotage" title="Sabotage">Sabotage</a>, <a href="/wiki/Deception" title="Deception">Deception</a>, <a href="/wiki/Counterintelligence" title="Counterintelligence">Counterintelligence</a>, <a href="/wiki/Analysis" title="Analysis">Analysis</a>, <a href="/wiki/Financial_intelligence" title="Financial intelligence">Financial intelligence</a>, <a href="/wiki/Propaganda" title="Propaganda">Propaganda</a>, and even <a href="/wiki/Assassination" title="Assassination">Assassination</a> might be considered all forms of espionage. Is intelligence a product, or process?<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><div class="poem"> <p>"Formulating a brief definition of so broad a term as intelligence is like making a <a href="/wiki/Microscopic" class="mw-redirect" title="Microscopic">microscopic</a> <a href="/wiki/Portrait" title="Portrait">portrait</a> of a <a href="/wiki/Continent" title="Continent">continent</a>, and the product of this effort is likely to have less value than the process of arriving at it, the reexamination of our own thinking as we seek to pinpoint the essentials of the concept." </p> </div><div class="templatequotecite">— <cite>Martin T. Bimfort, A Definition of Intelligence</cite></div></blockquote><figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Wolkowski-Craucher.jpg" class="mw-file-description"><noscript><img src="//upload.wikimedia.org/wikipedia/commons/thumb/5/53/Wolkowski-Craucher.jpg/220px-Wolkowski-Craucher.jpg" decoding="async" width="220" height="287" class="mw-file-element" data-file-width="787" data-file-height="1027"></noscript><span class="lazy-image-placeholder" style="width: 220px;height: 287px;" data-mw-src="//upload.wikimedia.org/wikipedia/commons/thumb/5/53/Wolkowski-Craucher.jpg/220px-Wolkowski-Craucher.jpg" data-width="220" data-height="287" data-mw-srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/53/Wolkowski-Craucher.jpg/330px-Wolkowski-Craucher.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/53/Wolkowski-Craucher.jpg/440px-Wolkowski-Craucher.jpg 2x" data-class="mw-file-element">&nbsp;</span></a><figcaption>Madame <a href="/wiki/Minna_Craucher" title="Minna Craucher">Minna Craucher</a> (<i>right</i>), a Finnish <a href="/wiki/Socialite" title="Socialite">socialite</a> and spy, with her chauffeur Boris Wolkowski (<i>left</i>) in 1930s</figcaption></figure><p>Scholars have also been eager to point out that the United States Intelligence Community does not own the definition of intelligence, nor espionage.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"></p><blockquote class="templatequote"><div class="poem"> <p>"Indeed, even today, we have no accepted definition of intelligence. The term is defined anew by each author who addresses it, and these definitions rarely refer to one another or build off what has been written before. Without a clear idea of what intelligence is, how can we develop a theory to explain how it works?<br> <br> ...For producers of intelligence, however, the equation "intelligence = information" is too vague to provide real guidance in their work. To professionals in the field, mere data is not intelligence; thus these definitions are incomplete. Think of how many names are in the telephone book, and how few of those names anyone ever seeks. It is what people do with data and information that gives them the special quality that we casually call "intelligence."" </p> </div><div class="templatequotecite">— <cite>Michael Warner, Wanted: A Definition of "Intelligence": Understanding Our Craft</cite></div></blockquote> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(2)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="History">History</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=2" title="Edit section: History" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-2 collapsible-block" id="mf-section-2"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/History_of_espionage" title="History of espionage">History of espionage</a></div> <div class="mw-heading mw-heading3"><h3 id="Ancient_world">Ancient world</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=3" title="Edit section: Ancient world" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Espionage has been recognized as of importance in military affairs since ancient times. </p><p>The oldest known classified document was a report made by a spy disguised as a <a href="/wiki/Envoy_(title)" title="Envoy (title)">diplomatic envoy</a> in the court of <a href="/wiki/King_Hammurabi" class="mw-redirect" title="King Hammurabi">King Hammurabi</a>, who died in around 1750 BC. The <a href="/wiki/Ancient_Egypt" title="Ancient Egypt">ancient Egyptians</a> had a developed secret service, and espionage is mentioned in the <i><a href="/wiki/Iliad" title="Iliad">Iliad</a></i>, the <a href="/wiki/Bible" title="Bible">Bible</a>, and the <a href="/wiki/Amarna_letters" title="Amarna letters">Amarna letters</a>.<sup id="cite_ref-foo_14-0" class="reference"><a href="#cite_note-foo-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> Espionage was also prevalent in the <a href="/wiki/Greco-Roman_world" title="Greco-Roman world">Greco-Roman world</a>, when spies employed illiterate subjects in <a href="/wiki/Civil_service" title="Civil service">civil services</a>.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> </p><p>The thesis that espionage and intelligence has a central role in <a href="/wiki/War" title="War">war</a> as well as <a href="/wiki/Peace" title="Peace">peace</a> was first advanced in <i><a href="/wiki/The_Art_of_War" title="The Art of War">The Art of War</a></i> and in the <i><a href="/wiki/Arthashastra" title="Arthashastra">Arthashastra</a></i>. </p> <div class="mw-heading mw-heading3"><h3 id="Middle_Ages">Middle Ages</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=4" title="Edit section: Middle Ages" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>In the <a href="/wiki/Middle_Ages" title="Middle Ages">Middle Ages</a> European states excelled at what has later been termed counter-<a href="/wiki/Subversion" title="Subversion">subversion</a> when Catholic <a href="/wiki/Inquisition" title="Inquisition">inquisitions</a> were staged to annihilate <a href="/wiki/Heresy" title="Heresy">heresy</a>. Inquisitions were marked by centrally organised mass <a href="/wiki/Interrogation" title="Interrogation">interrogations</a> and detailed record keeping. Western espionage changed fundamentally during the Renaissance when Italian <a href="/wiki/City-state" title="City-state">city-states</a> installed resident <a href="/wiki/Ambassador" title="Ambassador">ambassadors</a> in <a href="/wiki/Capital_cities" class="mw-redirect" title="Capital cities">capital cities</a> to collect intelligence. </p> <div class="mw-heading mw-heading3"><h3 id="The_Renaissance">The Renaissance</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=5" title="Edit section: The Renaissance" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Renaissance <a href="/wiki/Venice" title="Venice">Venice</a> became so obsessed with espionage that the <a href="/wiki/Council_of_Ten" title="Council of Ten">Council of Ten</a>, which was nominally responsible for <a href="/wiki/Security" title="Security">security</a>, did not even allow the <a href="/wiki/Doge_(title)" title="Doge (title)">doge</a> to consult government <a href="/wiki/Archive" title="Archive">archives</a> freely. In 1481 the Council of Ten barred all Venetian government officials from making contact with ambassadors or foreigners. Those revealing <a href="/wiki/Official_secret" class="mw-redirect" title="Official secret">official secrets</a> could face the <a href="/wiki/Capital_punishment" title="Capital punishment">death penalty</a>. Venice became obsessed with espionage because successful <a href="/wiki/International_trade" title="International trade">international trade</a> demanded that the city-state could protect its <a href="/wiki/Trade_secret" title="Trade secret">trade secrets</a>. </p><p>Under Queen <a href="/wiki/Elizabeth_I" title="Elizabeth I">Elizabeth I</a> of England (<span style="white-space:nowrap;"><abbr title="reigned">r.</abbr> 1558–1603</span>), <a href="/wiki/Francis_Walsingham" title="Francis Walsingham">Francis Walsingham</a> (<abbr title="circa">c.</abbr> 1532–1590) was appointed foreign secretary and intelligence chief.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> The novelist and journalist <a href="/wiki/Daniel_Defoe" title="Daniel Defoe">Daniel Defoe</a> (died 1731) not only spied for the British government, but also developed a theory of espionage foreshadowing modern <a href="/wiki/Police-state" class="mw-redirect" title="Police-state">police-state</a> methods.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="United_States">United States</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=6" title="Edit section: United States" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>During the <a href="/wiki/American_Revolution" title="American Revolution">American Revolution</a>, <a href="/wiki/Nathan_Hale" title="Nathan Hale">Nathan Hale</a> and <a href="/wiki/Benedict_Arnold" title="Benedict Arnold">Benedict Arnold</a> achieved their fame as spies, and there was considerable use of <a href="/wiki/American_Civil_War_spies" title="American Civil War spies">spies on both sides during the American Civil War</a>.<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> Though not a spy himself, <a href="/wiki/George_Washington" title="George Washington">George Washington</a> was America's first spymaster, utilizing espionage tactics against the British.<sup id="cite_ref-foo_14-1" class="reference"><a href="#cite_note-foo-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="World_War_I,_World_War_II"><span id="World_War_I.2C_World_War_II"></span>World War I, World War II</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=7" title="Edit section: World War I, World War II" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>In the 20th century, at the height of <a href="/wiki/World_War_I" title="World War I">World War I</a>, all <a href="/wiki/Great_power" title="Great power">great powers</a> except the <a href="/wiki/United_States" title="United States">United States</a> had elaborate civilian espionage systems, and all national military establishments had intelligence units. In order to protect the country against foreign agents, the <a href="/wiki/U.S._Congress" class="mw-redirect" title="U.S. Congress">U.S. Congress</a> passed the <a href="/wiki/Espionage_Act_of_1917" title="Espionage Act of 1917">Espionage Act of 1917</a>. <a href="/wiki/Mata_Hari" title="Mata Hari">Mata Hari</a>, who obtained information for Germany by seducing French officials, was the most noted espionage agent of World War I. Prior to <a href="/wiki/World_War_II" title="World War II">World War II</a>, <a href="/wiki/Nazi_Germany" title="Nazi Germany">Germany</a> and <a href="/wiki/Empire_of_Japan" title="Empire of Japan">Imperial Japan</a> established elaborate espionage nets. In 1942 the <a href="/wiki/Office_of_Strategic_Services" title="Office of Strategic Services">Office of Strategic Services</a> was founded by Gen. <a href="/wiki/William_J._Donovan" title="William J. Donovan">William J. Donovan</a>. However, the British system was the keystone of Allied intelligence. Numerous resistance groups such as the Austrian <a href="/wiki/Heinrich_Maier" title="Heinrich Maier">Maier</a>-Messner Group, the <a href="/wiki/French_Resistance" title="French Resistance">French Resistance</a>, the <a href="/wiki/Witte_Brigade" title="Witte Brigade">Witte Brigade</a>, <a href="/wiki/Milorg" title="Milorg">Milorg</a> and the Polish <a href="/wiki/Home_Army" title="Home Army">Home Army</a> worked against Nazi Germany and provided the Allied secret services with information that was very important for the war effort. </p> <div class="mw-heading mw-heading3"><h3 id="Cold_War">Cold War</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=8" title="Edit section: Cold War" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Since the end of <a href="/wiki/World_War_II" title="World War II">World War II</a>, the activity of espionage has enlarged, much of it growing out of the <a href="/wiki/Cold_War" title="Cold War">Cold War</a> between the United States and the <a href="/wiki/Former_Soviet_Union" class="mw-redirect" title="Former Soviet Union">former USSR</a>. The <a href="/wiki/Russian_Empire" title="Russian Empire">Russian Empire</a> and its successor, the <a href="/wiki/Soviet_Union" title="Soviet Union">Soviet Union</a>, have had a long tradition of espionage ranging from the <a href="/wiki/Okhrana" title="Okhrana">Okhrana</a> to the <a href="/wiki/KGB" title="KGB">KGB</a> (Committee for State Security), which also acted as a secret police force. In the United States, the 1947 National Security Act created the <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">Central Intelligence Agency</a> (CIA) to coordinate intelligence and the National Security Agency for research into codes and electronic communication. In addition to these, the United States has 13 other intelligence gathering agencies; most of the U.S. expenditures for intelligence gathering are budgeted to various Defense Dept. agencies and their programs. Under the intelligence reorganization of 2004, the director of national intelligence is responsible for overseeing and coordinating the activities and budgets of the U.S. intelligence agencies. </p><p>In the <a href="/wiki/Cold_War" title="Cold War">Cold War</a>, espionage cases included <a href="/wiki/Alger_Hiss" title="Alger Hiss">Alger Hiss</a>, <a href="/wiki/Whittaker_Chambers" title="Whittaker Chambers">Whittaker Chambers</a> and the Rosenberg Case. In 1952 the Communist Chinese captured two CIA agents and in 1960 <a href="/wiki/Francis_Gary_Powers" title="Francis Gary Powers">Francis Gary Powers</a>, <a href="/wiki/1960_U-2_incident" title="1960 U-2 incident">flying a U-2 reconnaissance mission</a> over the Soviet Union for the CIA, was shot down and captured. During the Cold War, many Soviet intelligence officials defected to the West, including Gen. <a href="/wiki/Walter_Krivitsky" title="Walter Krivitsky">Walter Krivitsky</a>, <a href="/wiki/Victor_Kravchenko_(defector)" title="Victor Kravchenko (defector)">Victor Kravchenko</a>, <a href="/wiki/Vladimir_Petrov_(diplomat)" title="Vladimir Petrov (diplomat)">Vladimir Petrov</a>, Peter Deriabin, Pawel Monat and <a href="/wiki/Oleg_Penkovsky" title="Oleg Penkovsky">Oleg Penkovsky</a> of the <a href="/wiki/GRU_(Soviet_Union)" title="GRU (Soviet Union)">GRU</a>. Among Western officials who defected to the Soviet Union are <a href="/wiki/Guy_Burgess" title="Guy Burgess">Guy Burgess</a> and <a href="/wiki/Donald_Maclean_(spy)" title="Donald Maclean (spy)">Donald D. Maclean</a> of Great Britain in 1951, <a href="/wiki/Otto_John" title="Otto John">Otto John</a> of West Germany in 1954, <a href="/wiki/William_Hamilton_Martin" class="mw-redirect" title="William Hamilton Martin">William H. Martin</a> and <a href="/wiki/Bernon_F._Mitchell" class="mw-redirect" title="Bernon F. Mitchell">Bernon F. Mitchell</a>, U.S. cryptographers, in 1960, and Harold (Kim) Philby of Great Britain in 1962. U.S. acknowledgment of its U-2 flights and the exchange of Francis Gary Powers for <a href="/wiki/Rudolf_Abel" title="Rudolf Abel">Rudolf Abel</a> in 1962 implied the legitimacy of some espionage as an arm of foreign policy. </p><p><a href="/wiki/China" title="China">China</a> has a very cost-effective intelligence program that is especially effective in monitoring neighboring countries such as <a href="/wiki/Mongolia" title="Mongolia">Mongolia</a>, <a href="/wiki/Russia" title="Russia">Russia</a> and <a href="/wiki/India" title="India">India</a>. Smaller countries can also mount effective and focused espionage efforts. For instance, the <a href="/wiki/Communist_Party_of_Vietnam" title="Communist Party of Vietnam">Vietnamese communists</a> had consistently superior intelligence during the <a href="/wiki/Vietnam_War" title="Vietnam War">Vietnam War</a>. Some Islamic countries, including <a href="/wiki/Libya" title="Libya">Libya</a>, <a href="/wiki/Iran" title="Iran">Iran</a> and <a href="/wiki/Syria" title="Syria">Syria</a>, have highly developed operations as well. <a href="/wiki/SAVAK" title="SAVAK">SAVAK</a>, the secret police of the <a href="/wiki/Pahlavi_dynasty" title="Pahlavi dynasty">Pahlavi dynasty</a>, was particularly feared by Iranian dissidents before the 1979 <a href="/wiki/Iranian_Revolution" class="mw-redirect" title="Iranian Revolution">Iranian Revolution</a>. </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(3)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Modern_day">Modern day</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=9" title="Edit section: Modern day" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-3 collapsible-block" id="mf-section-3"> <p>Today, spy agencies target the <a href="/wiki/Illegal_drug_trade" title="Illegal drug trade">illegal drug trade</a> and <a href="/wiki/Terrorism" title="Terrorism">terrorists</a> as well as state actors.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> </p><p>Intelligence services value certain intelligence collection techniques over others. The former Soviet Union, for example, preferred <a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">human sources</a> over <a href="/wiki/Open-source_intelligence" title="Open-source intelligence">research in open sources</a>, while the United States has tended to emphasize technological methods such as <a href="/wiki/Signals_intelligence" title="Signals intelligence">SIGINT</a> and <a href="/wiki/Imagery_intelligence" title="Imagery intelligence">IMINT</a>. In the Soviet Union, both political (<a href="/wiki/KGB" title="KGB">KGB</a>) and <a href="/wiki/Military_intelligence" title="Military intelligence">military intelligence</a> (<a href="/wiki/GRU_(Soviet_Union)" title="GRU (Soviet Union)">GRU</a>)<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> officers were judged by the number of agents they recruited. </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(4)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Targets_of_espionage">Targets of espionage</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=10" title="Edit section: Targets of espionage" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-4 collapsible-block" id="mf-section-4"> <p>Espionage agents are usually trained experts in a targeted field so they can differentiate mundane information from targets of value to their own organizational development. Correct identification of the target at its execution is the sole purpose of the espionage operation.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (October 2015)">citation needed</span></a></i>]</sup> </p><p>Broad areas of espionage targeting expertise include:<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (October 2015)">citation needed</span></a></i>]</sup> </p> <ul><li><a href="/wiki/Natural_resource" title="Natural resource">Natural resources</a>: strategic production identification and assessment (food, energy, materials). Agents are usually found among bureaucrats who administer these resources in their own countries</li> <li><a href="/wiki/Public_opinion" title="Public opinion">Popular sentiment</a> towards domestic and foreign policies (popular, middle class, elites). Agents often recruited from field journalistic crews, exchange postgraduate students and sociology researchers</li> <li>Strategic economic strengths (production, research, manufacture, infrastructure). Agents recruited from science and technology academia, commercial enterprises, and more rarely from among military technologists</li> <li><a href="/wiki/Military_capability" title="Military capability">Military capability</a> intelligence (offensive, defensive, manoeuvre, naval, air, space). Agents are trained by military espionage education facilities and posted to an area of operation with covert identities to minimize prosecution</li> <li><a href="/wiki/Counterintelligence" title="Counterintelligence">Counterintelligence</a> operations targeting opponent's intelligence services themselves, such as breaching the confidentiality of communications and recruiting defectors or <a href="/wiki/Mole_(espionage)" title="Mole (espionage)">moles</a></li></ul> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(5)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Methods_and_terminology">Methods and terminology</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=11" title="Edit section: Methods and terminology" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-5 collapsible-block" id="mf-section-5"> <div class="mw-heading mw-heading3"><h3 id="How_the_United_States_defines_espionage">How the United States defines espionage</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=12" title="Edit section: How the United States defines espionage" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Although the news media may speak of "spy satellites" and the like, espionage is not a synonym for all intelligence-gathering disciplines. It is a specific form of human source intelligence (<a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">HUMINT</a>). Codebreaking (<a href="/wiki/Cryptanalysis" title="Cryptanalysis">cryptanalysis</a> or <a href="/wiki/Signals_intelligence#Communications_intelligence" title="Signals intelligence">COMINT</a>), aircraft or satellite photography (<a href="/wiki/Imagery_intelligence" title="Imagery intelligence">IMINT</a>), and analysis of publicly available data sources (<a href="/wiki/Open-source_intelligence" title="Open-source intelligence">OSINT</a>) are all intelligence gathering disciplines, but none of them is considered espionage. Many HUMINT activities, such as prisoner <a href="/wiki/Interrogation" title="Interrogation">interrogation</a>, reports from military <a href="/wiki/Reconnaissance" title="Reconnaissance">reconnaissance</a> patrols and from diplomats, etc., are not considered espionage. Espionage is the disclosure of sensitive information (classified) to people who are not cleared for that information or access to that sensitive information. </p><p>Unlike other forms of <a href="/wiki/List_of_intelligence_gathering_disciplines" title="List of intelligence gathering disciplines">intelligence collection disciplines</a>, espionage usually involves accessing the place where the desired information is stored or accessing the people who know the information and will divulge it through some kind of <a href="/wiki/Deception" title="Deception">subterfuge</a>. There are exceptions to physical meetings, such as the <a href="/wiki/Oslo_Report" title="Oslo Report">Oslo Report</a>, or the insistence of <a href="/wiki/Robert_Hanssen" title="Robert Hanssen">Robert Hanssen</a> in never meeting the people who bought his information. </p><p> The US defines espionage towards itself as "the act of obtaining, delivering, transmitting, communicating, or receiving information about the national defence with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign nation". <i><a href="/wiki/Black%27s_Law_Dictionary" title="Black's Law Dictionary">Black's Law Dictionary</a></i> (1990) defines espionage as: "... gathering, transmitting, or losing ... information related to the <a href="/wiki/Defense_(military)" class="mw-redirect" title="Defense (military)">national defense</a>". Espionage is a violation of United States law, <a href="/wiki/Title_18_of_the_United_States_Code" title="Title 18 of the United States Code">18 U.S.C.</a> <a rel="nofollow" class="external text" href="https://www.law.cornell.edu/uscode/text/18/792">§§ 792</a>–<a rel="nofollow" class="external text" href="https://www.law.cornell.edu/uscode/text/18/798">798</a> and Article 106a of the <a href="/wiki/Uniform_Code_of_Military_Justice" title="Uniform Code of Military Justice">Uniform Code of Military Justice</a>.<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> The United States, like most nations, conducts espionage against other nations, under the control of the <a href="/wiki/National_Clandestine_Service" class="mw-redirect" title="National Clandestine Service">National Clandestine Service</a>.<link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1251242444"></p><table class="box-Update plainlinks metadata ambox ambox-content ambox-Update" role="presentation"><tbody><tr><td class="mbox-text"><div class="mbox-text-span">This article needs to be <b>updated</b>. The reason given is: What about the Defense Department, and the Director of National Intelligence?.<span class="hide-when-compact"> Please help update this article to reflect recent events or newly available information.</span> <span class="date-container"><i>(<span class="date">December 2021</span>)</i></span></div></td></tr></tbody></table><p> Britain's espionage activities are controlled by the <a href="/wiki/Secret_Intelligence_Service" class="mw-redirect" title="Secret Intelligence Service">Secret Intelligence Service</a>. </p><div class="mw-heading mw-heading3"><h3 id="Technology_and_techniques">Technology and techniques</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=13" title="Edit section: Technology and techniques" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Tradecraft" title="Tradecraft">Tradecraft</a> and <a href="/wiki/List_of_intelligence_gathering_disciplines" title="List of intelligence gathering disciplines">List of intelligence gathering disciplines</a></div> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col" style="column-width: 15em;"> <ul><li><a href="/wiki/Agent_handling" title="Agent handling">Agent handling</a></li> <li><a href="/wiki/Biographic_leverage" title="Biographic leverage">Biographic leverage</a></li> <li><a href="/wiki/Concealment_device" title="Concealment device">Concealment device</a></li> <li><a href="/wiki/Covert_agent" title="Covert agent">Covert agent</a></li> <li><a href="/wiki/Covert_listening_device" title="Covert listening device">Covert listening device</a></li> <li><a href="/wiki/Cut-out_(espionage)" class="mw-redirect" title="Cut-out (espionage)">Cut-out</a></li> <li><a href="/wiki/Cyber_spying" class="mw-redirect" title="Cyber spying">Cyber spying</a></li> <li><a href="/wiki/Dead_drop" title="Dead drop">Dead drop</a></li> <li><a href="/wiki/False_flag" title="False flag">False flag</a> operations</li> <li><a href="/wiki/Front_organisation" class="mw-redirect" title="Front organisation">Front organisation</a></li> <li><a href="/wiki/Human_intelligence" title="Human intelligence">Human intelligence</a> (HUMINT)</li> <li><a href="/wiki/Sexpionage" title="Sexpionage">Honeypot</a></li> <li><a href="/wiki/Impersonator" title="Impersonator">Impersonation</a></li> <li><a href="/wiki/Impostor" class="mw-redirect" title="Impostor">Impostor</a></li> <li><a href="/wiki/Interrogation" title="Interrogation">Interrogation</a></li> <li><a href="/wiki/Non-official_cover" class="mw-redirect" title="Non-official cover">Non-official cover</a></li> <li><a href="/wiki/Numbers_station" title="Numbers station">Numbers messaging</a></li> <li><a href="/wiki/Official_cover" class="mw-redirect" title="Official cover">Official cover</a></li> <li><a href="/wiki/Open-source_intelligence" title="Open-source intelligence">Open-source intelligence</a> (OSINT)</li> <li><a href="/wiki/One-way_voice_link" title="One-way voice link">One-way voice link</a></li> <li><a href="/wiki/Sabotage" title="Sabotage">Sabotage</a></li> <li><a href="/wiki/Safe_house" title="Safe house">Safe house</a></li> <li><a href="/wiki/Side_channel_attack" class="mw-redirect" title="Side channel attack">Side channel attack</a></li> <li><a href="/wiki/Signals_intelligence" title="Signals intelligence">Signals intelligence</a> (SIGINT)</li> <li><a href="/wiki/Spy_ship" title="Spy ship">Spy ship</a></li> <li><a href="/wiki/Steganography" title="Steganography">Steganography</a></li> <li><a href="/wiki/Surveillance" title="Surveillance">Surveillance</a></li> <li><a href="/wiki/Surveillance_aircraft" title="Surveillance aircraft">Surveillance aircraft</a></li> <li><a href="/wiki/Surveillance_balloon" class="mw-redirect" title="Surveillance balloon">Surveillance balloon</a></li></ul> </div> <p><b>Source:</b><sup id="cite_ref-PROTOCOL_24-0" class="reference"><a href="#cite_note-PROTOCOL-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(6)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Organization">Organization</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=14" title="Edit section: Organization" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-6 collapsible-block" id="mf-section-6"> <p>A spy is a person employed to seek out secret information from a source.<sup id="cite_ref-bar_25-0" class="reference"><a href="#cite_note-bar-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> Within the <a href="/wiki/United_States_Intelligence_Community" title="United States Intelligence Community">United States Intelligence Community</a>, "<a href="/wiki/Asset_(intelligence)" title="Asset (intelligence)">asset</a>" is more common usage. A <a href="/wiki/Case_officer" class="mw-redirect" title="Case officer">case officer</a> or <a href="/wiki/Special_Agent" class="mw-redirect" title="Special Agent">Special Agent</a>, who may have <a href="/wiki/Diplomatic_protection" title="Diplomatic protection">diplomatic status</a> (i.e., <a href="/wiki/Official_cover" class="mw-redirect" title="Official cover">official cover</a> or <a href="/wiki/Non-official_cover" class="mw-redirect" title="Non-official cover">non-official cover</a>), supports and directs the human collector. Cut-outs are <a href="/wiki/Courier" title="Courier">couriers</a> who do not know the agent or case officer but transfer messages. A <a href="/wiki/Safe_house" title="Safe house">safe house</a> is a refuge for spies. Spies often seek to obtain secret information from another source. </p><p>In larger networks, the organization can be complex with many methods to avoid detection, including <a href="/wiki/Clandestine_cell_system" title="Clandestine cell system">clandestine cell systems</a>. Often the players have never met. Case officers are stationed in foreign countries to recruit and supervise intelligence agents,<sup id="cite_ref-bar_25-1" class="reference"><a href="#cite_note-bar-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> who in turn spy on targets in the countries where they are assigned. A spy need not be a citizen of the target country and hence does not automatically commit <a href="/wiki/Treason" title="Treason">treason</a> when operating within it. While the more common practice is to recruit a person already trusted with access to sensitive information, sometimes a person with a well-prepared synthetic identity (cover background), called a <i>legend</i><sup id="cite_ref-bar_25-2" class="reference"><a href="#cite_note-bar-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> in <a href="/wiki/Tradecraft" title="Tradecraft">tradecraft</a>, may attempt to infiltrate a target organization. </p><p>These agents can be moles (who are recruited before they get access to secrets), <a href="/wiki/Defection" title="Defection">defectors</a> (who are recruited after they get access to secrets and leave their country) or <a href="/wiki/Clandestine_HUMINT#Defector_in_place" class="mw-redirect" title="Clandestine HUMINT">defectors in place</a> (who get access but do not leave). </p><p>A <i>legend</i> is also employed for an individual who is not an illegal agent, but is an ordinary citizen who is "relocated", for example, a "protected witness". Nevertheless, such a non-agent very likely will also have a case officer who will act as a controller. As in most, if not all synthetic identity schemes, for whatever purpose (illegal or legal), the assistance of a controller is required. </p><p>Spies may also be used to spread disinformation in the organization in which they are planted, such as giving false reports about their country's military movements, or about a competing company's ability to bring a product to market. Spies may be given other roles that also require infiltration, such as <a href="/wiki/Sabotage" title="Sabotage">sabotage</a>. </p><p>Many governments spy on their allies as well as their enemies, although they typically maintain a policy of not commenting on this. Governments also employ private companies to collect information on their behalf such as <a href="/wiki/SCG_International_Risk" title="SCG International Risk">SCG International Risk</a>, <a href="/wiki/International_Intelligence_Limited" class="mw-redirect" title="International Intelligence Limited">International Intelligence Limited</a> and others. </p><p>Many organizations, both national and non-national, conduct espionage operations. It should not be assumed that espionage is always directed at the most secret operations of a target country. National and terrorist organizations and other groups are also targeted.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> This is because governments want to retrieve information that they can use to be proactive in protecting their nation from potential terrorist attacks. </p><p>Communications both are necessary to espionage and <a href="/wiki/Clandestine_operation" title="Clandestine operation">clandestine operations</a>, and also a great vulnerability when the adversary has sophisticated SIGINT detection and interception capability. Spies rely on COVCOM or covert communication through technically advanced spy devices.<sup id="cite_ref-foo_14-2" class="reference"><a href="#cite_note-foo-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> Agents must also transfer money securely. </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(7)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Industrial_espionage">Industrial espionage</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=15" title="Edit section: Industrial espionage" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-7 collapsible-block" id="mf-section-7"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Industrial_espionage" title="Industrial espionage">Industrial espionage</a></div> <p><b>Industrial espionage</b>, also known as <b>economic espionage</b>, <b>corporate spying</b>, or <b>corporate espionage</b>, is a form of espionage conducted for <a href="/wiki/Commerce" title="Commerce">commercial</a> purposes instead of purely <a href="/wiki/National_security" title="National security">national security</a>.<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> While political espionage is conducted or orchestrated by governments and is international in scope, industrial or corporate espionage is more often national and occurs between companies or <a href="/wiki/Corporation" title="Corporation">corporations</a>. It may include the acquisition of <a href="/wiki/Intellectual_property" title="Intellectual property">intellectual property</a>, such as information on industrial manufacture, ideas, techniques and processes, recipes and formulas. Or it could include sequestration of proprietary or operational information, such as that on customer datasets, pricing, sales, marketing, research and development, policies, prospective bids, planning or marketing strategies or the changing compositions and locations of production. It may describe activities such as theft of <a href="/wiki/Trade_secrets" class="mw-redirect" title="Trade secrets">trade secrets</a>, <a href="/wiki/Bribery" title="Bribery">bribery</a>, <a href="/wiki/Blackmail" title="Blackmail">blackmail</a> and technological surveillance. As well as orchestrating espionage on commercial organizations, governments can also be targets – for example, to determine the terms of a tender for a government contract. </p><p>Reportedly <a href="/wiki/Canada" title="Canada">Canada</a> is losing $12 billion<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> and <a href="/wiki/Germany" title="Germany">German</a> companies are estimated to be losing about €50 billion ($87 billion) and 30,000 jobs<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> to industrial espionage every year. </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(8)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Agents_in_espionage">Agents in espionage</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=16" title="Edit section: Agents in espionage" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-8 collapsible-block" id="mf-section-8"> <p>In espionage jargon, an "agent" is the person who does the spying. They may be a citizen of a country recruited by that country to spy on another; a citizen of a country recruited by that country to carry out <a href="/wiki/False_flag" title="False flag">false flag</a> assignments disrupting his own country; a citizen of one country who is recruited by a second country to spy on or work against his own country or a third country, and more. </p><p>In popular usage, this term is sometimes confused with an <i><a href="/wiki/Intelligence_officer" title="Intelligence officer">intelligence officer</a></i>, <i>intelligence operative</i>, or <i>case officer</i> who recruits and handles agents. </p><p>Among the most common forms of agent are: </p> <ul><li><a href="/wiki/Agent_provocateur" title="Agent provocateur">Agent provocateur</a>: instigates trouble or provides information to gather as many people as possible into one location for an arrest.</li> <li>Intelligence agent: provides access to <a href="/wiki/Information_sensitivity" title="Information sensitivity">sensitive information</a> through the use of special privileges. If used in <i>corporate intelligence</i> gathering, this may include gathering information of a corporate business venture or <a href="/wiki/Portfolio_(finance)" title="Portfolio (finance)">stock portfolio</a>. In <i>economic intelligence</i>, "Economic Analysts may use their specialized skills to analyze and interpret economic trends and developments, assess and track foreign financial activities, and develop new econometric and modelling methodologies."<sup id="cite_ref-Economic_intelligence_30-0" class="reference"><a href="#cite_note-Economic_intelligence-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> This may also include information of trade or tariff.</li> <li><a href="/wiki/Agent_of_influence" title="Agent of influence">Agent-of-influence</a>: provides political influence in an area of interest, possibly including <a href="/wiki/Propaganda" title="Propaganda">publications</a> needed to further an intelligence service agenda.<sup id="cite_ref-bar_25-3" class="reference"><a href="#cite_note-bar-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> The use of the media to print a story to <a href="/wiki/Disinformation" title="Disinformation">mislead</a> a foreign service into action, exposing their operations while under surveillance.</li> <li><a href="/wiki/Double_agent" title="Double agent">Double agent</a>: engages in clandestine activity for two intelligence or security services (or more in joint operations), who provides information about one or about each to the other, and who wittingly withholds significant information from one on the instructions of the other or is unwittingly manipulated by one so that significant facts are withheld from the adversary. <a href="/wiki/Peddler" title="Peddler">Peddlers</a>, <a href="/wiki/Fabricator_(intelligence)" title="Fabricator (intelligence)">fabricators</a>, and others who work for themselves rather than a service are not double agents because they are not agents. The fact that double agents have an agent relationship with both sides distinguishes them from penetrations, who normally are placed with the target service in a staff or officer capacity."<sup id="cite_ref-double_agent_31-0" class="reference"><a href="#cite_note-double_agent-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> <ul><li><a href="/wiki/Re-doubled_agent" class="mw-redirect" title="Re-doubled agent">Redoubled agent</a>: forced to mislead the foreign intelligence service after being caught as a double agent.</li> <li>Unwitting double agent: offers or is forced to recruit as a double or redoubled agent and in the process is recruited by either a third-party intelligence service or his own government without the knowledge of the intended target intelligence service or the agent. This can be useful in capturing important information from an agent that is attempting to seek allegiance with another country. The <b>double agent</b> usually has knowledge of both intelligence services and can identify operational techniques of both, thus making third-party recruitment difficult or impossible. The knowledge of operational techniques can also affect the relationship between the operations officer (or case officer) and the agent if the case is transferred by an operational targeting officer] to a new operations officer, leaving the new officer vulnerable to attack. This type of transfer <i>may</i> occur when an officer has completed his term of service or when his <i>cover</i> is blown.</li></ul></li> <li><a href="/wiki/Sleeper_agent" title="Sleeper agent">Sleeper agent</a>: recruited to <i>wake up</i> and perform a specific set of tasks or functions while living undercover in an area of interest. This type of agent is not the same as a <i>deep cover operative</i>, who continually contacts a case officer to file intelligence reports. A sleeper agent is not in contact with anyone until <i>activated</i>.</li> <li><a href="/wiki/Triple_agent" class="mw-redirect" title="Triple agent">Triple agent</a>: works for three intelligence services.<sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Please_clarify" title="Wikipedia:Please clarify"><span title="Please clarify the preceding statement or statements with a good explanation from a reliable source. (July 2020)">how?</span></a></i>]</sup></li></ul> <p>Less common or lesser known forms of agent include: </p> <ul><li>Access agent: provides access to other potential agents by providing <a href="/wiki/Offender_profiling" title="Offender profiling">offender profiling</a> information that can help lead to recruitment into an intelligence service.</li> <li><a href="/wiki/Confusion_agent" title="Confusion agent">Confusion agent</a>: provides misleading information to an enemy intelligence service or attempts to discredit the operations of the <i>target</i> in an operation.</li> <li>Facilities agent: provides access to buildings, such as <a href="/wiki/Garage_(residential)" title="Garage (residential)">garages</a> or offices used for <a href="/wiki/Staging_area" title="Staging area">staging</a> operations, resupply, etc.</li> <li><a href="/wiki/Cover_(intelligence_gathering)#Non-official_cover" title="Cover (intelligence gathering)">Illegal agent</a>: lives in another country under <a href="/wiki/Identity_document_forgery" title="Identity document forgery">false credentials</a> and does not report to a local station. A nonofficial cover operative can be dubbed an "illegal"<sup id="cite_ref-Illegal_32-0" class="reference"><a href="#cite_note-Illegal-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> when working in another country without diplomatic protection.</li> <li>Principal agent: functions as a <a href="/wiki/Agent_handling" title="Agent handling">handler</a> for an established network of agents, usually considered "blue chip".</li></ul> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(9)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Law">Law</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=17" title="Edit section: Law" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-9 collapsible-block" id="mf-section-9"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Intelligence_law" title="Intelligence law">Intelligence law</a></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1251242444"><table class="box-Globalize plainlinks metadata ambox ambox-content ambox-globalize" role="presentation"><tbody><tr><td class="mbox-text"><div class="mbox-text-span">The examples and perspective in this article <b>may not represent a <a href="/wiki/Wikipedia:WikiProject_Countering_systemic_bias" title="Wikipedia:WikiProject Countering systemic bias">worldwide view</a> of the subject</b>.<span class="hide-when-compact"> You may <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Espionage&amp;action=edit">improve this article</a>, discuss the issue on the <a href="/wiki/Talk:Espionage" title="Talk:Espionage">talk page</a>, or <a href="/wiki/Wikipedia:Article_wizard" title="Wikipedia:Article wizard">create a new article</a>, as appropriate.</span> <span class="date-container"><i>(<span class="date">August 2024</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <p>Espionage against a nation is a crime under the <a href="/wiki/Legal_code" class="mw-redirect" title="Legal code">legal code</a> of many world states. </p> <div class="mw-heading mw-heading3"><h3 id="Espionage_law_in_the_United_States">Espionage law in the United States</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=18" title="Edit section: Espionage law in the United States" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>In the United States, it is covered by the <a href="/wiki/Espionage_Act_of_1917" title="Espionage Act of 1917">Espionage Act of 1917</a>. The risks of espionage vary. A spy violating the host country's laws may be deported, imprisoned, or even executed. A spy violating its own country's laws can be imprisoned for espionage or/and <a href="/wiki/Treason" title="Treason">treason</a> (which in the United States and some other jurisdictions can only occur if they take up arms or aids the enemy against their own country during wartime), or even executed, as the <a href="/wiki/Rosenbergs" class="mw-redirect" title="Rosenbergs">Rosenbergs</a> were. For example, when <a href="/wiki/Aldrich_Ames" title="Aldrich Ames">Aldrich Ames</a> handed a stack of dossiers of U.S. <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">Central Intelligence Agency</a> (CIA) agents in the <a href="/wiki/Eastern_Bloc" title="Eastern Bloc">Eastern Bloc</a> to his KGB-officer "handler", the KGB "rolled up" several networks, and at least ten people were secretly shot. When Ames was arrested by the U.S. <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a> (FBI), he faced life in prison; his contact, who had <a href="/wiki/Diplomatic_immunity" title="Diplomatic immunity">diplomatic immunity</a>, was declared <i><a href="/wiki/Persona_non_grata" title="Persona non grata">persona non grata</a></i> and taken to the airport. Ames' wife was threatened with life imprisonment if her husband did not cooperate; he did, and she was given a five-year sentence. <a href="/wiki/Hugh_Francis_Redmond" title="Hugh Francis Redmond">Hugh Francis Redmond</a>, a CIA officer in China, spent nineteen years in a Chinese prison for espionage—and died there—as he was operating without diplomatic cover and immunity.<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> </p><p>In United States law, treason,<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> espionage,<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> and spying<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> are separate crimes. Treason and espionage have graduated punishment levels. </p><p>The United States in <a href="/wiki/World_War_I" title="World War I">World War I</a> passed the Espionage Act of 1917. Over the years, many spies, such as the <a href="/wiki/Soble_spy_ring" class="mw-redirect" title="Soble spy ring">Soble spy ring</a>, <a href="/wiki/Robert_Lee_Johnson_(spy)" title="Robert Lee Johnson (spy)">Robert Lee Johnson</a>, <a href="/wiki/Julius_and_Ethel_Rosenberg" title="Julius and Ethel Rosenberg">the Rosenberg ring</a>, <a href="/wiki/Aldrich_Hazen_Ames" class="mw-redirect" title="Aldrich Hazen Ames">Aldrich Hazen Ames</a>,<sup id="cite_ref-jyaames_37-0" class="reference"><a href="#cite_note-jyaames-37"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Robert_Philip_Hanssen" class="mw-redirect" title="Robert Philip Hanssen">Robert Philip Hanssen</a>,<sup id="cite_ref-fashans_38-0" class="reference"><a href="#cite_note-fashans-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Jonathan_Pollard" title="Jonathan Pollard">Jonathan Pollard</a>, <a href="/wiki/John_Anthony_Walker" title="John Anthony Walker">John Anthony Walker</a>, <a href="/wiki/James_Hall_III" title="James Hall III">James Hall III</a>, and others have been prosecuted under this law. </p><p>In modern times, many people convicted of espionage have been given penal sentences rather than execution. For example, <a href="/wiki/Aldrich_Hazen_Ames" class="mw-redirect" title="Aldrich Hazen Ames">Aldrich Hazen Ames</a> is an American CIA analyst, turned KGB mole, who was convicted of espionage in 1994; he is serving a <a href="/wiki/Life_sentence" class="mw-redirect" title="Life sentence">life sentence</a> without the possibility of parole in the high-security <a href="/wiki/United_States_Penitentiary,_Allenwood" title="United States Penitentiary, Allenwood">Allenwood U.S. Penitentiary</a>.<sup id="cite_ref-Federal_Bureau_of_Prisons_39-0" class="reference"><a href="#cite_note-Federal_Bureau_of_Prisons-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup> Ames was formerly a 31-year <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">CIA</a> <a href="/wiki/Counter-intelligence" class="mw-redirect" title="Counter-intelligence">counterintelligence</a> officer and analyst who committed espionage against his country by <a href="/wiki/Spying" class="mw-redirect" title="Spying">spying</a> for the <a href="/wiki/Soviet_Union" title="Soviet Union">Soviet Union</a> and <a href="/wiki/Russia" title="Russia">Russia</a>.<sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> So far as it is known, Ames compromised the second-largest number of CIA agents, second only to <a href="/wiki/Robert_Hanssen" title="Robert Hanssen">Robert Hanssen</a>, who also served a prison sentence until his death in 2023.<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Use_against_non-spies">Use against non-spies</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=19" title="Edit section: Use against non-spies" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Espionage laws are also used to prosecute non-spies. In the United States, the Espionage Act of 1917 was used against socialist politician <a href="/wiki/Eugene_V._Debs" title="Eugene V. Debs">Eugene V. Debs</a> (at that time the Act had much stricter guidelines and amongst other things banned speech against military recruiting). The law was later used to suppress publication of periodicals, for example of <a href="/wiki/Father_Coughlin" class="mw-redirect" title="Father Coughlin">Father Coughlin</a> in <a href="/wiki/World_War_II" title="World War II">World War II</a>. In the early 21st century, the act was used to prosecute <a href="/wiki/Whistleblower" class="mw-redirect" title="Whistleblower">whistleblowers</a> such as <a href="/wiki/Thomas_Andrews_Drake" class="mw-redirect" title="Thomas Andrews Drake">Thomas Andrews Drake</a>, <a href="/wiki/John_Kiriakou" title="John Kiriakou">John Kiriakou</a>, and <a href="/wiki/Edward_Snowden" title="Edward Snowden">Edward Snowden</a>, as well as officials who communicated with journalists for innocuous reasons, such as <a href="/wiki/Stephen_Jin-Woo_Kim" title="Stephen Jin-Woo Kim">Stephen Jin-Woo Kim</a>.<sup id="cite_ref-josh_gerstein1_42-0" class="reference"><a href="#cite_note-josh_gerstein1-42"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> </p><p>As of 2012<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Espionage&amp;action=edit">[update]</a></sup>, India and Pakistan were holding several hundred prisoners of each other's country for minor violations like trespass or visa overstay, often with accusations of espionage attached. Some of these include cases where Pakistan and India both deny citizenship to these people, leaving them <a href="/wiki/Statelessness" title="Statelessness">stateless</a>.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (May 2021)">citation needed</span></a></i>]</sup> The BBC reported in 2012 on one such case, that of Mohammed Idrees, who was held under Indian police control for approximately 13 years for overstaying his 15-day visa by 2–3 days after seeing his ill parents in 1999. Much of the 13 years were spent in prison waiting for a hearing, and more time was spent homeless or living with generous families. The Indian <a href="/wiki/People%27s_Union_for_Civil_Liberties" title="People's Union for Civil Liberties">People's Union for Civil Liberties</a> and <a href="/wiki/Human_Rights_Law_Network" title="Human Rights Law Network">Human Rights Law Network</a> both decried his treatment. The BBC attributed some of the problems to tensions caused by the <a href="/wiki/Kashmir_conflict" title="Kashmir conflict">Kashmir conflict</a>.<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Espionage_law_in_the_UK">Espionage law in the UK</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=20" title="Edit section: Espionage law in the UK" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>From ancient times, the penalty for espionage in many countries was execution. This was true right up until the era of <a href="/wiki/World_War_II" title="World War II">World War II</a>; for example, <a href="/wiki/Josef_Jakobs" title="Josef Jakobs">Josef Jakobs</a> was a Nazi spy who parachuted into Great Britain in 1941 and was executed for espionage. </p><p>Espionage is illegal in the UK under the <a href="/wiki/National_Security_Act_2023" title="National Security Act 2023">National Security Act 2023</a>, which repealed prior Official Secrets Acts and creates three separate offences for espionage. A person is liable to be imprisoned for life for committing an offence under Section 1 of the Act, or 14 years for an offence under Sections 2 and 3 </p> <div class="mw-heading mw-heading4"><h4 id="Government_intelligence_law_and_its_distinction_from_espionage">Government intelligence law and its distinction from espionage</h4><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=21" title="Edit section: Government intelligence law and its distinction from espionage" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Government intelligence is very much distinct from espionage, and is not illegal in the UK, providing that the organisations of individuals are registered, often with the ICO, and are acting within the restrictions of the Regulation of Investigatory Powers Act (RIPA). 'Intelligence' is considered legally as "information of all sorts gathered by a government or organisation to guide its decisions. It includes information that may be both public and private, obtained from much different public or secret sources. It could consist entirely of information from either publicly available or secret sources, or be a combination of the two."<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup> </p><p>However, espionage and intelligence can be linked. According to the MI5 website, "foreign intelligence officers acting in the UK under diplomatic cover may enjoy immunity from prosecution. Such persons can only be tried for spying (or, indeed, any criminal offence) if diplomatic immunity is waived beforehand. Those officers operating without diplomatic cover have no such immunity from prosecution". </p><p>There are also laws surrounding government and organisational intelligence and surveillance. Generally, the body involved should be issued with some form of warrant or permission from the government and should be enacting their procedures in the interest of protecting national security or the safety of public citizens. Those carrying out intelligence missions should act within not only RIPA but also the Data Protection Act and Human Rights Act. However, there are spy equipment laws and legal requirements around intelligence methods that vary for each form of intelligence enacted. </p> <div class="mw-heading mw-heading3"><h3 id="Military_intelligence_and_military_justice">Military intelligence and military justice</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=22" title="Edit section: Military intelligence and military justice" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:L%27espion_-_Alphonse_de_Neuville_-_1880.jpg" class="mw-file-description"><noscript><img src="//upload.wikimedia.org/wikipedia/commons/thumb/1/1a/L%27espion_-_Alphonse_de_Neuville_-_1880.jpg/250px-L%27espion_-_Alphonse_de_Neuville_-_1880.jpg" decoding="async" width="220" height="144" class="mw-file-element" data-file-width="1599" data-file-height="1047"></noscript><span class="lazy-image-placeholder" style="width: 220px;height: 144px;" data-mw-src="//upload.wikimedia.org/wikipedia/commons/thumb/1/1a/L%27espion_-_Alphonse_de_Neuville_-_1880.jpg/250px-L%27espion_-_Alphonse_de_Neuville_-_1880.jpg" data-width="220" data-height="144" data-mw-srcset="//upload.wikimedia.org/wikipedia/commons/thumb/1/1a/L%27espion_-_Alphonse_de_Neuville_-_1880.jpg/330px-L%27espion_-_Alphonse_de_Neuville_-_1880.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/1/1a/L%27espion_-_Alphonse_de_Neuville_-_1880.jpg/500px-L%27espion_-_Alphonse_de_Neuville_-_1880.jpg 2x" data-class="mw-file-element">&nbsp;</span></a><figcaption>Painting of French spy captured during the <a href="/wiki/Franco-Prussian_War" title="Franco-Prussian War">Franco-Prussian War</a> by <a href="/wiki/Alphonse_de_Neuville" title="Alphonse de Neuville">Alphonse de Neuville</a>, 1880</figcaption></figure> <p>In war, espionage is considered permissible as many nations recognize the inevitability of opposing sides seeking intelligence each about the dispositions of the other. To make the mission easier and successful, <a href="/wiki/Combatant" title="Combatant">combatants</a> wear <a href="/wiki/Disguise" title="Disguise">disguises</a> to conceal their true identity from the enemy while penetrating enemy lines for intelligence gathering. However, if they are caught behind enemy lines in disguises, they are not entitled to <a href="/wiki/Prisoner-of-war" class="mw-redirect" title="Prisoner-of-war">prisoner-of-war</a> status and subject to <a href="/wiki/Prosecution" class="mw-redirect" title="Prosecution">prosecution</a> and punishment—including <a href="/wiki/Execution" class="mw-redirect" title="Execution">execution</a>. </p><p>The <a href="/wiki/Hague_Convention_of_1907" class="mw-redirect" title="Hague Convention of 1907">Hague Convention of 1907</a> addresses the status of wartime spies, specifically within "Laws and Customs of War on Land" (Hague IV); October 18, 1907: Chapter II Spies".<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> Article 29 states that a person is considered a spy who, acts clandestinely or on false pretences, infiltrates enemy lines with the intention of acquiring intelligence about the enemy and communicate it to the <a href="/wiki/Belligerent" title="Belligerent">belligerent</a> during times of war. Soldiers who penetrate enemy lines in proper uniforms for the purpose of acquiring intelligence are not considered spies but are <a href="/wiki/Combatant#Privileged_combatants" title="Combatant">lawful combatants</a> entitled to be treated as prisoners of war upon capture by the enemy. Article 30 states that a spy captured behind enemy lines may only be punished following a trial. However, Article 31 provides that if a spy successfully rejoined his own military and is then captured by the enemy as a lawful combatant, he cannot be punished for his previous acts of espionage and must be treated as a prisoner of war. This provision does not apply to citizens who committed <a href="/wiki/Treason" title="Treason">treason</a> against their own country or co-belligerents of that country and may be captured and prosecuted at any place or any time regardless whether he rejoined the military to which he belongs or not or during or after the war.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup> </p><p>The ones that are excluded from being treated as spies while behind enemy lines are escaping prisoners of war and downed <a href="/wiki/Airmen" class="mw-redirect" title="Airmen">airmen</a> as <a href="/wiki/International_law" title="International law">international law</a> distinguishes between a disguised spy and a disguised escaper.<sup id="cite_ref-PROTOCOL_24-1" class="reference"><a href="#cite_note-PROTOCOL-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> It is permissible for these groups to wear enemy uniforms or civilian clothes in order to facilitate their escape back to friendly lines so long as they do not attack enemy forces, collect military intelligence, or engage in similar military operations while so disguised.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup> Soldiers who are wearing enemy uniforms or civilian clothes simply for the sake of warmth along with other purposes rather than engaging in espionage or similar military operations while so attired are also excluded from being treated as unlawful combatants.<sup id="cite_ref-PROTOCOL_24-2" class="reference"><a href="#cite_note-PROTOCOL-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> </p><p><a href="/wiki/Sabotage" title="Sabotage">Saboteurs</a> are treated as spies as they too wear disguises behind enemy lines for the purpose of waging destruction on an enemy's vital targets in addition to intelligence gathering.<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup> For example, during <a href="/wiki/World_War_II" title="World War II">World War II</a>, eight German agents entered the U.S. in June 1942 as part of <a href="/wiki/Operation_Pastorius" title="Operation Pastorius">Operation Pastorius</a>, a sabotage mission against U.S. economic targets. Two weeks later, all were arrested in civilian clothes by the <a href="/wiki/FBI" class="mw-redirect" title="FBI">FBI</a> thanks to two German agents betraying the mission to the U.S. Under the Hague Convention of 1907, these Germans were classified as spies and tried by a <a href="/wiki/Military_justice" title="Military justice">military tribunal</a> in <a href="/wiki/Washington_D.C." class="mw-redirect" title="Washington D.C.">Washington D.C.</a><sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup> On August 3, 1942, all eight were found guilty and sentenced to death. Five days later, six were executed by <a href="/wiki/Electric_chair" title="Electric chair">electric chair</a> at the District of Columbia jail. Two who had given evidence against the others had their sentences reduced by President <a href="/wiki/Franklin_D._Roosevelt" title="Franklin D. Roosevelt">Franklin D. Roosevelt</a> to prison terms. In 1948, they were released by President <a href="/wiki/Harry_S._Truman" title="Harry S. Truman">Harry S. Truman</a> and deported to the <a href="/wiki/American_Zone_of_Occupation#American_Zone_of_Occupation" class="mw-redirect" title="American Zone of Occupation">American Zone of occupied Germany</a>. </p><p>The U.S. codification of enemy spies is Article 106 of the <a href="/wiki/Uniform_Code_of_Military_Justice" title="Uniform Code of Military Justice">Uniform Code of Military Justice</a>. This provides a mandatory death sentence if a person captured in the act is proven to be "lurking as a spy or acting as a spy in or about any place, vessel, or aircraft, within the control or jurisdiction of any of the armed forces, or in or about any shipyard, any manufacturing or industrial plant, or any other place or institution engaged in work in aid of the prosecution of the war by the United States, or elsewhere".<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup> </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(10)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Spy_fiction">Spy fiction</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=23" title="Edit section: Spy fiction" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-10 collapsible-block" id="mf-section-10"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Spy_fiction" title="Spy fiction">Spy fiction</a></div> <p>Spies have long been favorite topics for novelists and filmmakers.<sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> An early example of espionage literature is <i><a href="/wiki/Kim_(novel)" title="Kim (novel)">Kim</a></i> by the English novelist <a href="/wiki/Rudyard_Kipling" title="Rudyard Kipling">Rudyard Kipling</a>, with a description of the training of an intelligence agent in the <a href="/wiki/Great_Game" title="Great Game">Great Game</a> between the <a href="/wiki/United_Kingdom_of_Great_Britain_and_Ireland" title="United Kingdom of Great Britain and Ireland">UK</a> and <a href="/wiki/Russia" title="Russia">Russia</a> in 19th century <a href="/wiki/Central_Asia" title="Central Asia">Central Asia</a>. An even earlier work was <a href="/wiki/James_Fenimore_Cooper" title="James Fenimore Cooper">James Fenimore Cooper</a>'s classic novel, <i><a href="/wiki/The_Spy_(Cooper_novel)" title="The Spy (Cooper novel)">The Spy</a>,</i> written in 1821, about an American spy in New York during the <a href="/wiki/American_Revolutionary_War" title="American Revolutionary War">Revolutionary War</a>. </p><p>During the many 20th-century spy scandals, much information became publicly known about national spy agencies and dozens of real-life secret agents. These sensational stories piqued public interest in a profession largely off-limits to <a href="/wiki/Human_interest_story" class="mw-redirect" title="Human interest story">human interest news reporting</a>, a natural consequence of the secrecy inherent in their work. To fill in the blanks, the popular conception of the secret agent has been formed largely by 20th and 21st-century fiction and film. Attractive and sociable real-life agents such as <a href="/wiki/Valerie_Plame" title="Valerie Plame">Valerie Plame</a> find little employment in serious fiction, however. The fictional secret agent is more often a loner, sometimes amoral—an <a href="/wiki/Existentialism" title="Existentialism">existential</a> hero operating outside the everyday constraints of society. Loner spy personalities may have been a stereotype of convenience for authors who already knew how to write loner <a href="/wiki/Private_investigator" title="Private investigator">private investigator</a> characters that sold well from the 1920s to the present.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup> </p><p><a href="/wiki/Johnny_Fedora" title="Johnny Fedora">Johnny Fedora</a> achieved popularity as a fictional agent of early <a href="/wiki/Cold_War_espionage" title="Cold War espionage">Cold War espionage</a>, but <a href="/wiki/James_Bond" title="James Bond">James Bond</a> is the most commercially successful of the many spy characters created by intelligence insiders during that struggle. Other fictional agents include Le Carré's <a href="/wiki/George_Smiley" title="George Smiley">George Smiley</a>, and <a href="/wiki/Harry_Palmer" title="Harry Palmer">Harry Palmer</a> as played by <a href="/wiki/Michael_Caine" title="Michael Caine">Michael Caine</a>. </p><p>Jumping on the spy bandwagon, other writers also started writing about spy fiction featuring female spies as protagonists, such as <i><a href="/wiki/The_Baroness_(novels)" title="The Baroness (novels)">The Baroness</a></i>, which has more graphic action and sex, as compared to other novels featuring male protagonists. </p><p>Spy fiction has permeated the <a href="/wiki/Video_game" title="Video game">video game</a> world as well, in games such as <i><a href="/wiki/Perfect_Dark" title="Perfect Dark">Perfect Dark</a></i>, <i><a href="/wiki/GoldenEye_007_(1997_video_game)" title="GoldenEye 007 (1997 video game)">GoldenEye 007</a></i>, <i><a href="/wiki/The_Operative:_No_One_Lives_Forever" title="The Operative: No One Lives Forever">No One Lives Forever</a></i>, <i><a href="/wiki/Tom_Clancy%27s_Splinter_Cell" title="Tom Clancy's Splinter Cell">Tom Clancy's Splinter Cell</a></i> and the <a href="/wiki/Metal_Gear" title="Metal Gear"><i>Metal Gear</i> series</a>. </p><p>Espionage has also made its way into comedy depictions. The 1960s TV series <i><a href="/wiki/Get_Smart_(TV_series)" class="mw-redirect" title="Get Smart (TV series)">Get Smart</a></i>, the 1983 Finnish film <i><a href="/wiki/Agent_000_and_the_Deadly_Curves" class="mw-redirect" title="Agent 000 and the Deadly Curves">Agent 000 and the Deadly Curves</a></i>, and <i><a href="/wiki/Johnny_English_(film_series)" title="Johnny English (film series)">Johnny English</a></i> film trilogy portrays an inept spy, while the 1985 movie <i><a href="/wiki/Spies_Like_Us" title="Spies Like Us">Spies Like Us</a></i> depicts a pair of none-too-bright men sent to the Soviet Union to investigate a missile. </p><p>The historical novel <i>The Emperor and the Spy</i> highlights the adventurous life of U.S. Colonel <a href="/wiki/Sidney_Mashbir" title="Sidney Mashbir">Sidney Forrester Mashbir</a>, who during the 1920s and 1930s attempted to prevent war with Japan, and when war did erupt, he became General MacArthur's top advisor in the Pacific Theater of World War Two.<sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-58" class="reference"><a href="#cite_note-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup> </p><p>Black Widow is also a fictional agent who was introduced as a <a href="/wiki/Russia" title="Russia">Russian</a> spy, an antagonist of the superhero <a href="/wiki/Iron_Man" title="Iron Man">Iron Man</a>. She later became an agent of the fictional spy agency <a href="/wiki/S.H.I.E.L.D." title="S.H.I.E.L.D.">S.H.I.E.L.D.</a> and a member of the superhero team the <a href="/wiki/Avengers_(comics)" title="Avengers (comics)">Avengers</a>. </p><p>Real espionage is actually quite boring work.<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup> </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(11)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="See_also">See also</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=24" title="Edit section: See also" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-11 collapsible-block" id="mf-section-11"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1184024115"><div class="div-col" style="column-width: 30em;"> <ul><li><a href="/wiki/American_espionage_in_China" title="American espionage in China">American espionage in China</a></li> <li><a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">Central Intelligence Agency</a></li> <li><a href="/wiki/Chinese_espionage_in_the_United_States" title="Chinese espionage in the United States">Chinese espionage in the United States</a></li> <li><a href="/wiki/Clandestine_operation" title="Clandestine operation">Clandestine operation</a></li> <li><a href="/wiki/Cover_(intelligence_gathering)" title="Cover (intelligence gathering)">Cover (intelligence gathering)</a></li> <li><a href="/wiki/Covert_operation" title="Covert operation">Covert operation</a></li> <li><a href="/wiki/Detective" title="Detective">Detective</a></li> <li><a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a></li> <li><a href="/wiki/Foreign_agent" title="Foreign agent">Foreign agent</a></li> <li><a href="/wiki/History_of_Soviet_espionage" class="mw-redirect" title="History of Soviet espionage">History of Soviet espionage</a></li> <li><a href="/wiki/Human_intelligence_(intelligence_gathering)" title="Human intelligence (intelligence gathering)">Human intelligence (intelligence gathering)</a></li> <li><a href="/wiki/Intelligence_assessment" title="Intelligence assessment">Intelligence assessment</a></li> <li><a href="/wiki/James_Gannon_(author)" title="James Gannon (author)">James Gannon (author)</a></li> <li><a href="/wiki/List_of_intelligence_agencies" title="List of intelligence agencies">List of intelligence agencies</a></li> <li><a href="/wiki/List_of_intelligence_gathering_disciplines" title="List of intelligence gathering disciplines">List of intelligence gathering disciplines</a></li> <li><a href="/wiki/MI5" title="MI5">MI5</a></li> <li><a href="/wiki/Military_intelligence" title="Military intelligence">Military intelligence</a></li> <li><a href="/wiki/Secret_identity" title="Secret identity">Secret identity</a></li> <li><a href="/wiki/Secret_service" title="Secret service">Secret service</a></li> <li><a href="/wiki/Sleeper_agent" title="Sleeper agent">Sleeper agent</a></li> <li><a href="/wiki/Special_agent" title="Special agent">Special agent</a></li> <li><a href="/wiki/Spying_on_United_Nations_leaders_by_United_States_diplomats" class="mw-redirect" title="Spying on United Nations leaders by United States diplomats">Spying on United Nations leaders by United States diplomats</a></li> <li><a href="/wiki/Undercover_operation" class="mw-redirect" title="Undercover operation">Undercover operation</a></li></ul> </div> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(12)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="References">References</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=25" title="Edit section: References" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-12 collapsible-block" id="mf-section-12"> <div class="mw-heading mw-heading3"><h3 id="Citations">Citations</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=26" title="Edit section: Citations" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.mi5.gov.uk/espionage">"Espionage"</a>. <a href="/wiki/MI5" title="MI5">MI5</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Espionage&amp;rft.pub=MI5&amp;rft_id=https%3A%2F%2Fwww.mi5.gov.uk%2Fespionage&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text">Fischbacher-Smith, D., 2011. "The enemy has passed through the gate: Insider threats, the dark triad, and the challenges around security". <i>Journal of Organizational Effectiveness: People and Performance</i>, 2(2), pp. 134–156.</span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBreakspear2013" class="citation journal cs1">Breakspear, Alan (2013-10-01). <a rel="nofollow" class="external text" href="https://www.tandfonline.com/doi/full/10.1080/02684527.2012.699285">"A New Definition of Intelligence"</a>. <i>Intelligence and National Security</i>. <b>28</b> (5): <span class="nowrap">678–</span>693. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F02684527.2012.699285">10.1080/02684527.2012.699285</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0268-4527">0268-4527</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Intelligence+and+National+Security&amp;rft.atitle=A+New+Definition+of+Intelligence&amp;rft.volume=28&amp;rft.issue=5&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E678-%3C%2Fspan%3E693&amp;rft.date=2013-10-01&amp;rft_id=info%3Adoi%2F10.1080%2F02684527.2012.699285&amp;rft.issn=0268-4527&amp;rft.aulast=Breakspear&amp;rft.aufirst=Alan&amp;rft_id=https%3A%2F%2Fwww.tandfonline.com%2Fdoi%2Ffull%2F10.1080%2F02684527.2012.699285&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTroy1991" class="citation journal cs1">Troy, Thomas F. (1991-12-01). <a rel="nofollow" class="external text" href="https://www.tandfonline.com/doi/abs/10.1080/08850609108435193">"The "correct" definition of intelligence"</a>. <i>International Journal of Intelligence and CounterIntelligence</i>. <b>5</b> (4): <span class="nowrap">433–</span>454. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F08850609108435193">10.1080/08850609108435193</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0885-0607">0885-0607</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Journal+of+Intelligence+and+CounterIntelligence&amp;rft.atitle=The+%E2%80%9Ccorrect%E2%80%9D+definition+of+intelligence&amp;rft.volume=5&amp;rft.issue=4&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E433-%3C%2Fspan%3E454&amp;rft.date=1991-12-01&amp;rft_id=info%3Adoi%2F10.1080%2F08850609108435193&amp;rft.issn=0885-0607&amp;rft.aulast=Troy&amp;rft.aufirst=Thomas+F.&amp;rft_id=https%3A%2F%2Fwww.tandfonline.com%2Fdoi%2Fabs%2F10.1080%2F08850609108435193&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPili2019" class="citation journal cs1">Pili, Giangiuseppe (2019-05-04). <a rel="nofollow" class="external text" href="https://www.tandfonline.com/doi/full/10.1080/23800992.2019.1649113?scroll=top&amp;needAccess=true">"Toward a Philosophical Definition of Intelligence"</a>. <i>The International Journal of Intelligence, Security, and Public Affairs</i>. <b>21</b> (2): <span class="nowrap">162–</span>190. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F23800992.2019.1649113">10.1080/23800992.2019.1649113</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2380-0992">2380-0992</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+International+Journal+of+Intelligence%2C+Security%2C+and+Public+Affairs&amp;rft.atitle=Toward+a+Philosophical+Definition+of+Intelligence&amp;rft.volume=21&amp;rft.issue=2&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E162-%3C%2Fspan%3E190&amp;rft.date=2019-05-04&amp;rft_id=info%3Adoi%2F10.1080%2F23800992.2019.1649113&amp;rft.issn=2380-0992&amp;rft.aulast=Pili&amp;rft.aufirst=Giangiuseppe&amp;rft_id=https%3A%2F%2Fwww.tandfonline.com%2Fdoi%2Ffull%2F10.1080%2F23800992.2019.1649113%3Fscroll%3Dtop%26needAccess%3Dtrue&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFalode2021" class="citation journal cs1">Falode, Adewunmi (2021). <a rel="nofollow" class="external text" href="https://www.ceeol.com/search/article-detail?id=1225445">"FOUND: A DEFINITION OF INTELLIGENCE"</a>. <i>Journal of Social Sciences</i>. <b>IV</b> (1): <span class="nowrap">70–</span>73. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2587-3490">2587-3490</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Social+Sciences&amp;rft.atitle=FOUND%3A+A+DEFINITION+OF+INTELLIGENCE&amp;rft.volume=IV&amp;rft.issue=1&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E70-%3C%2Fspan%3E73&amp;rft.date=2021&amp;rft.issn=2587-3490&amp;rft.aulast=Falode&amp;rft.aufirst=Adewunmi&amp;rft_id=https%3A%2F%2Fwww.ceeol.com%2Fsearch%2Farticle-detail%3Fid%3D1225445&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDiderichsen2020" class="citation web cs1">Diderichsen, Adam (2020). <a rel="nofollow" class="external text" href="https://www.taylorfrancis.com/chapters/edit/10.1201/9781003009771-8/spreading-intelligence-adam-diderichsen">"Spreading intelligence"</a>. <i>Routledge</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Routledge&amp;rft.atitle=Spreading+intelligence&amp;rft.date=2020&amp;rft.aulast=Diderichsen&amp;rft.aufirst=Adam&amp;rft_id=https%3A%2F%2Fwww.taylorfrancis.com%2Fchapters%2Fedit%2F10.1201%2F9781003009771-8%2Fspreading-intelligence-adam-diderichsen&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchefflerDietrich2023" class="citation journal cs1">Scheffler, Alessandro; Dietrich, Jan-Hendrik (2023-10-02). <a rel="nofollow" class="external text" href="https://www.tandfonline.com/doi/full/10.1080/08850607.2023.2187190">"Military Intelligence: Ill-Defined and Understudied"</a>. <i>International Journal of Intelligence and CounterIntelligence</i>. <b>36</b> (4): <span class="nowrap">1047–</span>1066. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F08850607.2023.2187190">10.1080/08850607.2023.2187190</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0885-0607">0885-0607</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Journal+of+Intelligence+and+CounterIntelligence&amp;rft.atitle=Military+Intelligence%3A+Ill-Defined+and+Understudied&amp;rft.volume=36&amp;rft.issue=4&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E1047-%3C%2Fspan%3E1066&amp;rft.date=2023-10-02&amp;rft_id=info%3Adoi%2F10.1080%2F08850607.2023.2187190&amp;rft.issn=0885-0607&amp;rft.aulast=Scheffler&amp;rft.aufirst=Alessandro&amp;rft.au=Dietrich%2C+Jan-Hendrik&amp;rft_id=https%3A%2F%2Fwww.tandfonline.com%2Fdoi%2Ffull%2F10.1080%2F08850607.2023.2187190&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGaspard2017" class="citation journal cs1">Gaspard, Jules J.S. (2017-07-03). <a rel="nofollow" class="external text" href="https://www.tandfonline.com/doi/full/10.1080/08850607.2017.1263527">"Intelligence without Essence: Rejecting the Classical Theory of Definition"</a>. <i>International Journal of Intelligence and CounterIntelligence</i>. <b>30</b> (3): <span class="nowrap">557–</span>582. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F08850607.2017.1263527">10.1080/08850607.2017.1263527</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0885-0607">0885-0607</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Journal+of+Intelligence+and+CounterIntelligence&amp;rft.atitle=Intelligence+without+Essence%3A+Rejecting+the+Classical+Theory+of+Definition&amp;rft.volume=30&amp;rft.issue=3&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E557-%3C%2Fspan%3E582&amp;rft.date=2017-07-03&amp;rft_id=info%3Adoi%2F10.1080%2F08850607.2017.1263527&amp;rft.issn=0885-0607&amp;rft.aulast=Gaspard&amp;rft.aufirst=Jules+J.S.&amp;rft_id=https%3A%2F%2Fwww.tandfonline.com%2Fdoi%2Ffull%2F10.1080%2F08850607.2017.1263527&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBaron2024" class="citation web cs1">Baron, Frederick (March 28, 2024). <a rel="nofollow" class="external text" href="https://www.ni-u.edu/wp-content/uploads/2024/04/Why-Define-Intelligence.pdf">"Why Define Intelligence?"</a> <span class="cs1-format">(PDF)</span>. <i>National Intelligence University</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=National+Intelligence+University&amp;rft.atitle=Why+Define+Intelligence%3F&amp;rft.date=2024-03-28&amp;rft.aulast=Baron&amp;rft.aufirst=Frederick&amp;rft_id=https%3A%2F%2Fwww.ni-u.edu%2Fwp-content%2Fuploads%2F2024%2F04%2FWhy-Define-Intelligence.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVrist_RønnHøffding2013" class="citation journal cs1">Vrist Rønn, Kira; Høffding, Simon (2013-10-01). <a rel="nofollow" class="external text" href="https://www.tandfonline.com/doi/abs/10.1080/02684527.2012.701438">"The Epistemic Status of Intelligence: An Epistemological Contribution to the Understanding of Intelligence"</a>. <i>Intelligence and National Security</i>. <b>28</b> (5): <span class="nowrap">694–</span>716. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F02684527.2012.701438">10.1080/02684527.2012.701438</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0268-4527">0268-4527</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Intelligence+and+National+Security&amp;rft.atitle=The+Epistemic+Status+of+Intelligence%3A+An+Epistemological+Contribution+to+the+Understanding+of+Intelligence&amp;rft.volume=28&amp;rft.issue=5&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E694-%3C%2Fspan%3E716&amp;rft.date=2013-10-01&amp;rft_id=info%3Adoi%2F10.1080%2F02684527.2012.701438&amp;rft.issn=0268-4527&amp;rft.aulast=Vrist+R%C3%B8nn&amp;rft.aufirst=Kira&amp;rft.au=H%C3%B8ffding%2C+Simon&amp;rft_id=https%3A%2F%2Fwww.tandfonline.com%2Fdoi%2Fabs%2F10.1080%2F02684527.2012.701438&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBimfort1995" class="citation web cs1">Bimfort, Martin T. (September 18, 1995). <a rel="nofollow" class="external text" href="https://www.cia.gov/resources/csi/static/A-Definition-Of-Intelligence.pdf">"A Definition of Intelligence"</a> <span class="cs1-format">(PDF)</span>. <i>CIA Reading Room</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=CIA+Reading+Room&amp;rft.atitle=A+Definition+of+Intelligence&amp;rft.date=1995-09-18&amp;rft.aulast=Bimfort&amp;rft.aufirst=Martin+T.&amp;rft_id=https%3A%2F%2Fwww.cia.gov%2Fresources%2Fcsi%2Fstatic%2FA-Definition-Of-Intelligence.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStoutWarner2019" class="citation web cs1">Stout, Mark; Warner, Michael (2019). <a rel="nofollow" class="external text" href="https://www.taylorfrancis.com/chapters/edit/10.4324/9780429028830-6/intelligence-intelligence-mark-stout-michael-warner">"Developing Intelligence Theory: Intelligence is as intelligence does"</a>. <i>Taylor and Francis</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Taylor+and+Francis&amp;rft.atitle=Developing+Intelligence+Theory%3A+Intelligence+is+as+intelligence+does&amp;rft.date=2019&amp;rft.aulast=Stout&amp;rft.aufirst=Mark&amp;rft.au=Warner%2C+Michael&amp;rft_id=https%3A%2F%2Fwww.taylorfrancis.com%2Fchapters%2Fedit%2F10.4324%2F9780429028830-6%2Fintelligence-intelligence-mark-stout-michael-warner&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-foo-14"><span class="mw-cite-backlink">^ <a href="#cite_ref-foo_14-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-foo_14-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-foo_14-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.spymuseum.org/education-programs/spy-resources/espionage-facts/">"Espionage Facts"</a>. <i>International Spy Museum</i><span class="reference-accessdate">. Retrieved <span class="nowrap">12 July</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=International+Spy+Museum&amp;rft.atitle=Espionage+Facts&amp;rft_id=https%3A%2F%2Fwww.spymuseum.org%2Feducation-programs%2Fspy-resources%2Fespionage-facts%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichmond1998" class="citation journal cs1">Richmond, J. A. (1998). <a rel="nofollow" class="external text" href="https://www.jstor.org/stable/643204">"Spies in Ancient Greece"</a>. <i>Greece &amp; Rome</i>. <b>45</b> (1): <span class="nowrap">1–</span>18. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Fgr%2F45.1.1">10.1093/gr/45.1.1</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0017-3835">0017-3835</a>. <a href="/wiki/JSTOR_(identifier)" class="mw-redirect" title="JSTOR (identifier)">JSTOR</a> <a rel="nofollow" class="external text" href="https://www.jstor.org/stable/643204">643204</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Greece+%26+Rome&amp;rft.atitle=Spies+in+Ancient+Greece&amp;rft.volume=45&amp;rft.issue=1&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E1-%3C%2Fspan%3E18&amp;rft.date=1998&amp;rft.issn=0017-3835&amp;rft_id=https%3A%2F%2Fwww.jstor.org%2Fstable%2F643204%23id-name%3DJSTOR&amp;rft_id=info%3Adoi%2F10.1093%2Fgr%2F45.1.1&amp;rft.aulast=Richmond&amp;rft.aufirst=J.+A.&amp;rft_id=https%3A%2F%2Fwww.jstor.org%2Fstable%2F643204&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFÑaco_del_Hoyo2014" class="citation journal cs1">Ñaco del Hoyo, Toni (November 2014). <a rel="nofollow" class="external text" href="https://www.jstor.org/stable/26098615">"Roman and Pontic Intelligence Strategies: Politics and War in the Time of Mithradates VI"</a>. <i>War in History</i>. <b>21</b> (4): <span class="nowrap">401–</span>421. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F0968344513505528">10.1177/0968344513505528</a>. <a href="/wiki/JSTOR_(identifier)" class="mw-redirect" title="JSTOR (identifier)">JSTOR</a> <a rel="nofollow" class="external text" href="https://www.jstor.org/stable/26098615">26098615</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:220652440">220652440</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=War+in+History&amp;rft.atitle=Roman+and+Pontic+Intelligence+Strategies%3A+Politics+and+War+in+the+Time+of+Mithradates+VI&amp;rft.volume=21&amp;rft.issue=4&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E401-%3C%2Fspan%3E421&amp;rft.date=2014-11&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A220652440%23id-name%3DS2CID&amp;rft_id=https%3A%2F%2Fwww.jstor.org%2Fstable%2F26098615%23id-name%3DJSTOR&amp;rft_id=info%3Adoi%2F10.1177%2F0968344513505528&amp;rft.aulast=%C3%91aco+del+Hoyo&amp;rft.aufirst=Toni&amp;rft_id=https%3A%2F%2Fwww.jstor.org%2Fstable%2F26098615&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFehoward2006" class="citation web cs1">ehoward (2006-06-12). <a rel="nofollow" class="external text" href="https://www.historynet.com/espionage-in-ancient-rome/">"Espionage in Ancient Rome"</a>. <i>HistoryNet</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-12-21</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=HistoryNet&amp;rft.atitle=Espionage+in+Ancient+Rome&amp;rft.date=2006-06-12&amp;rft.au=ehoward&amp;rft_id=https%3A%2F%2Fwww.historynet.com%2Fespionage-in-ancient-rome%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAndrew2018" class="citation book cs1">Andrew, Christopher (28 June 2018). <i>The Secret World: A History of Intelligence</i>. Penguin Books Limited. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780241305225" title="Special:BookSources/9780241305225"><bdi>9780241305225</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Secret+World%3A+A+History+of+Intelligence&amp;rft.pub=Penguin+Books+Limited&amp;rft.date=2018-06-28&amp;rft.isbn=9780241305225&amp;rft.aulast=Andrew&amp;rft.aufirst=Christopher&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFUlfkotte1997" class="citation book cs1 cs1-prop-foreign-lang-source"><a href="/wiki/Udo_Ulfkotte" title="Udo Ulfkotte">Ulfkotte, Udo</a> (1997). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=V_oEAQAAIAAJ"><i>Verschlusssache BND</i></a> (in German) (2 ed.). Munich: Koehler &amp; Amelang. p. 38. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9783733802141" title="Special:BookSources/9783733802141"><bdi>9783733802141</bdi></a><span class="reference-accessdate">. Retrieved <span class="nowrap">6 January</span> 2023</span>. <q>Ein neuer Typ des Spions War Daniel Defoe (1650–1731), der Autor des weltberühmten Romans "Robinson Crusoe" ... Zudem verfaßte Defoe eine Theorie der Spionage, in der er der Regierung die Spitzelmethoden des Polizeistaates empfahl.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Verschlusssache+BND&amp;rft.place=Munich&amp;rft.pages=38&amp;rft.edition=2&amp;rft.pub=Koehler+%26+Amelang&amp;rft.date=1997&amp;rft.isbn=9783733802141&amp;rft.aulast=Ulfkotte&amp;rft.aufirst=Udo&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DV_oEAQAAIAAJ&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAllen" class="citation web cs1">Allen, Thomas. <a rel="nofollow" class="external text" href="https://irp.fas.org/cia/product/civilwar.pdf">"Intelligence in the Civil War"</a> <span class="cs1-format">(PDF)</span>. Intelligence Resource Program, Central Intelligence Agency<span class="reference-accessdate">. Retrieved <span class="nowrap">September 3,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intelligence+in+the+Civil+War&amp;rft.pub=Intelligence+Resource+Program%2C+Central+Intelligence+Agency&amp;rft.aulast=Allen&amp;rft.aufirst=Thomas&amp;rft_id=https%3A%2F%2Firp.fas.org%2Fcia%2Fproduct%2Fcivilwar.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text">Arrillaga, Pauline. <a rel="nofollow" class="external text" href="http://www.cbsnews.com/stories/2011/05/07/ap/national/main20060765.shtml">"China's spying seeks secret US info."</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110519102542/http://www.cbsnews.com/stories/2011/05/07/ap/national/main20060765.shtml">Archived</a> May 19, 2011, at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> <i>AP</i>, 7 May 2011.</span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSuvorov1987" class="citation book cs1"><a href="/wiki/Victor_Suvorov" class="mw-redirect" title="Victor Suvorov">Suvorov, Victor</a> (1987). <i>Inside the Aquarium</i>. Berkley. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-425-09474-7" title="Special:BookSources/978-0-425-09474-7"><bdi>978-0-425-09474-7</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Inside+the+Aquarium&amp;rft.pub=Berkley&amp;rft.date=1987&amp;rft.isbn=978-0-425-09474-7&amp;rft.aulast=Suvorov&amp;rft.aufirst=Victor&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFUS_Department_of_Defense2007" class="citation web cs1"><a href="/wiki/U.S._Department_of_Defense" class="mw-redirect" title="U.S. Department of Defense">US Department of Defense</a> (2007-07-12). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20091108082044/http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf">"Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://www.dtic.mil/doctrine/jel/new_pubs/jp1_02.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2009-11-08<span class="reference-accessdate">. Retrieved <span class="nowrap">2007-10-01</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Joint+Publication+1-02+Department+of+Defense+Dictionary+of+Military+and+Associated+Terms&amp;rft.date=2007-07-12&amp;rft.au=US+Department+of+Defense&amp;rft_id=http%3A%2F%2Fwww.dtic.mil%2Fdoctrine%2Fjel%2Fnew_pubs%2Fjp1_02.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-PROTOCOL-24"><span class="mw-cite-backlink">^ <a href="#cite_ref-PROTOCOL_24-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-PROTOCOL_24-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-PROTOCOL_24-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFIgor_Primoratz2013" class="citation book cs1">Igor Primoratz (August 15, 2013). <i>New Rules for Victims of Armed Conflicts: Commentary on the Two 1977 Protocols Additional to the Geneva Conventions of 1949 (Nijhoff Classics in International Law)</i>. <a href="/wiki/Martinus_Nijhoff_Publishers" class="mw-redirect" title="Martinus Nijhoff Publishers">Martinus Nijhoff Publishers</a>. p. 214.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=New+Rules+for+Victims+of+Armed+Conflicts%3A+Commentary+on+the+Two+1977+Protocols+Additional+to+the+Geneva+Conventions+of+1949+%28Nijhoff+Classics+in+International+Law%29&amp;rft.pages=214&amp;rft.pub=Martinus+Nijhoff+Publishers&amp;rft.date=2013-08-15&amp;rft.au=Igor+Primoratz&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-bar-25"><span class="mw-cite-backlink">^ <a href="#cite_ref-bar_25-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-bar_25-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-bar_25-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-bar_25-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.spymuseum.org/education-programs/spy-resources/language-of-espionage/">"Language of Espionage"</a>. <i>International Spy Museum</i><span class="reference-accessdate">. Retrieved <span class="nowrap">12 July</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=International+Spy+Museum&amp;rft.atitle=Language+of+Espionage&amp;rft_id=https%3A%2F%2Fwww.spymuseum.org%2Feducation-programs%2Fspy-resources%2Flanguage-of-espionage%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.utep.edu/liberalarts/nssi/_Files/docs/Theses1/Utilizing-Cyber-Espionage-to-Combat-Terrorism-Adkins.pdf">"Cyber Espionage to Combat Terrorism"</a> <span class="cs1-format">(PDF)</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Cyber+Espionage+to+Combat+Terrorism&amp;rft_id=https%3A%2F%2Fwww.utep.edu%2Fliberalarts%2Fnssi%2F_Files%2Fdocs%2FTheses1%2FUtilizing-Cyber-Espionage-to-Combat-Terrorism-Adkins.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.economist.com/news/international/21578383-cyber-spying-grows-bigger-and-more-boring-unusual-suspects">"Unusual suspects: Cyber-spying grows bigger and more boring"</a>. <i><a href="/wiki/The_Economist" title="The Economist">The Economist</a></i>. 25 May 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">25 May</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Economist&amp;rft.atitle=Unusual+suspects%3A+Cyber-spying+grows+bigger+and+more+boring&amp;rft.date=2013-05-25&amp;rft_id=https%3A%2F%2Fwww.economist.com%2Fnews%2Finternational%2F21578383-cyber-spying-grows-bigger-and-more-boring-unusual-suspects&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text">"<a rel="nofollow" class="external text" href="https://www.cbc.ca/news/canada/defectors-say-china-running-1-000-spies-in-canada-1.557085">Defectors say China running 1,000 spies in Canada</a>". CBC News. June 15, 2005.</span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text">"<a rel="nofollow" class="external text" href="http://www.smh.com.au/world/beijings-spies-cost-german-firms-billions-says-espionage-expert-20090724-dw73.html">Beijing's spies cost German firms billions, says espionage expert</a>". The Sydney Morning Herald. July 25, 2009.</span> </li> <li id="cite_note-Economic_intelligence-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-Economic_intelligence_30-0">^</a></b></span> <span class="reference-text">Cia.gov</span> </li> <li id="cite_note-double_agent-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-double_agent_31-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20190701161536/https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol6no1/html/v06i1a05p_0001.htm">"Double Agent"</a>. cia.gov. Archived from <a rel="nofollow" class="external text" href="https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol6no1/html/v06i1a05p_0001.htm">the original</a> on 2019-07-01<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-05-14</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Double+Agent&amp;rft.pub=cia.gov&amp;rft_id=https%3A%2F%2Fwww.cia.gov%2Flibrary%2Fcenter-for-the-study-of-intelligence%2Fkent-csi%2Fvol6no1%2Fhtml%2Fv06i1a05p_0001.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-Illegal-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-Illegal_32-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.mi5.gov.uk/output/how-do-spies-operate.html">Illegal</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110106175822/https://www.mi5.gov.uk/output/how-do-spies-operate.html">Archived</a> January 6, 2011, at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> Mi5.gov. "How spies operate".</span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1 cs1-prop-unfit"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131102085259/http://newamericamedia.org/2011/02/cia-status-improves-contractors-case-for-immunity.php">"CIA Status Improves Contractor's Case for Immunity"</a>. New America Media. Archived from the original on 2013-11-02<span class="reference-accessdate">. Retrieved <span class="nowrap">2013-08-17</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=CIA+Status+Improves+Contractor%27s+Case+for+Immunity&amp;rft.pub=New+America+Media&amp;rft_id=http%3A%2F%2Fnewamericamedia.org%2F2011%2F02%2Fcia-status-improves-contractors-case-for-immunity.php&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://uscode.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t17t20+1130+29++%28treason%29">treason</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20121203024319/http://uscode.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t17t20+1130+29++%28treason%29">Archived</a> December 3, 2012, at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20121203024325/http://uscode.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t17t20+486+45++%28espionage%25">"espionage"</a>. Archived from <a rel="nofollow" class="external text" href="http://uscode.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t17t20+486+45++%28espionage%25">the original</a> on 3 December 2012.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=espionage&amp;rft_id=http%3A%2F%2Fuscode.house.gov%2Fuscode-cgi%2Ffastweb.exe%3Fgetdoc%2Buscview%2Bt17t20%2B486%2B45%2B%2B%2528espionage%2525&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://uscode.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t09t12+600+1++%28spying%29%20%20%20%20%20%20%20%20%20%20">spying</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20121203024508/http://uscode.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t09t12+600+1++%28spying%29%20%20%20%20%20%20%20%20%20%20">Archived</a> December 3, 2012, at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-jyaames-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-jyaames_37-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110513222808/http://www.jya.com/ames.htm">"Aldrich Ames Criminal Complaint"</a>. John Young Architect. Archived from <a rel="nofollow" class="external text" href="http://www.jya.com/ames.htm">the original</a> on 2011-05-13<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-03-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Aldrich+Ames+Criminal+Complaint&amp;rft.pub=John+Young+Architect&amp;rft_id=http%3A%2F%2Fwww.jya.com%2Fames.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-fashans-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-fashans_38-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://fas.org/irp/ops/ci/hanssen_affidavit.html">"USA v. Robert Philip Hanssen: Affidavit in Support of Criminal Complaint, Arrest Warrant and Search Warrant"</a>. fas.org<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-03-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=USA+v.+Robert+Philip+Hanssen%3A+Affidavit+in+Support+of+Criminal+Complaint%2C+Arrest+Warrant+and+Search+Warrant&amp;rft.pub=fas.org&amp;rft_id=https%3A%2F%2Ffas.org%2Firp%2Fops%2Fci%2Fhanssen_affidavit.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-Federal_Bureau_of_Prisons-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-Federal_Bureau_of_Prisons_39-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120919121009/http://www.bop.gov/iloc2/InmateFinderServlet?Transaction=NameSearch&amp;needingMoreList=false&amp;LastName=Ames&amp;Middle=&amp;FirstName=Aldrich+&amp;Race=U&amp;Sex=U&amp;Age=&amp;x=23&amp;y=24">"Aldrich Hazen Ames Register Number: 40087-083"</a>. <i>Bop.gov</i>. Federal Bureau of Prisons. Archived from <a rel="nofollow" class="external text" href="http://www.bop.gov/iloc2/InmateFinderServlet?Transaction=NameSearch&amp;needingMoreList=false&amp;LastName=Ames&amp;Middle=&amp;FirstName=Aldrich+&amp;Race=U&amp;Sex=U&amp;Age=&amp;x=23&amp;y=24">the original</a> on 2012-09-19<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-01-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Bop.gov&amp;rft.atitle=Aldrich+Hazen+Ames+Register+Number%3A+40087-083&amp;rft_id=http%3A%2F%2Fwww.bop.gov%2Filoc2%2FInmateFinderServlet%3FTransaction%3DNameSearch%26needingMoreList%3Dfalse%26LastName%3DAmes%26Middle%3D%26FirstName%3DAldrich%2B%26Race%3DU%26Sex%3DU%26Age%3D%26x%3D23%26y%3D24&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span> <i>(Search result)</i></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20101013065115/http://www.fbi.gov/about-us/history/famous-cases/aldrich-hazen-ames">"Aldrich Hazen Ames"</a>. FBI. Archived from <a rel="nofollow" class="external text" href="https://www.fbi.gov/about-us/history/famous-cases/aldrich-hazen-ames">the original</a> on 2010-10-13.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Aldrich+Hazen+Ames&amp;rft.pub=FBI&amp;rft_id=https%3A%2F%2Fwww.fbi.gov%2Fabout-us%2Fhistory%2Ffamous-cases%2Faldrich-hazen-ames&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.nytimes.com/2023/06/05/us/robert-hanssen-spy-dead.html">"Robert Hanssen, F.B.I. Agent Exposed as Spy for Moscow, Dies at 79"</a>. <i>The New York Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">5 June</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+New+York+Times&amp;rft.atitle=Robert+Hanssen%2C+F.B.I.+Agent+Exposed+as+Spy+for+Moscow%2C+Dies+at+79&amp;rft_id=https%3A%2F%2Fwww.nytimes.com%2F2023%2F06%2F05%2Fus%2Frobert-hanssen-spy-dead.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-josh_gerstein1-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-josh_gerstein1_42-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGerstein2011" class="citation web cs1">Gerstein, Josh (2011-03-07). <a rel="nofollow" class="external text" href="http://www.politico.com/news/stories/0311/50761.html">"Obama's hard line on leaks"</a>. politico.com<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-03-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Obama%27s+hard+line+on+leaks&amp;rft.pub=politico.com&amp;rft.date=2011-03-07&amp;rft.aulast=Gerstein&amp;rft.aufirst=Josh&amp;rft_id=http%3A%2F%2Fwww.politico.com%2Fnews%2Fstories%2F0311%2F50761.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text">See the article on <a href="/wiki/John_Kiriakou" title="John Kiriakou">John Kiriakou</a></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.bbc.co.uk/mediacentre/proginfo/2012/43/ws-nowhereman.html">Your World: The Nowhere Man</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190915061632/https://www.bbc.co.uk/mediacentre/proginfo/2012/43/ws-nowhereman.html">Archived</a> 2019-09-15 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Rupa Jha, October 21, 2012, BBC (retrieved 2012-10-20) (Program link: <a rel="nofollow" class="external text" href="https://www.bbc.co.uk/programmes/p00z57wt">The Nowhere Man</a>)</span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131101174455/https://www.mi5.gov.uk/home/the-threats/espionage/what-is-espionage.html">"What is espionage?"</a>. <i>MI5 - the Security Service</i>. Archived from <a rel="nofollow" class="external text" href="https://www.mi5.gov.uk/home/the-threats/espionage/what-is-espionage.html">the original</a> on 2013-11-01<span class="reference-accessdate">. Retrieved <span class="nowrap">2013-08-16</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=MI5+-+the+Security+Service&amp;rft.atitle=What+is+espionage%3F&amp;rft_id=https%3A%2F%2Fwww.mi5.gov.uk%2Fhome%2Fthe-threats%2Fespionage%2Fwhat-is-espionage.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.icrc.org/ihl/385ec082b509e76c41256739003e636d/1d1726425f6955aec125641e0038bfd6?OpenDocument">"Convention (IV) respecting the Laws and Customs of War on Land and its annex: Regulations concerning the Laws and Customs of War on Land. The Hague, 18 October 1907"</a>. <a href="/wiki/International_Committee_of_the_Red_Cross" title="International Committee of the Red Cross">International Committee of the Red Cross</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Convention+%28IV%29+respecting+the+Laws+and+Customs+of+War+on+Land+and+its+annex%3A+Regulations+concerning+the+Laws+and+Customs+of+War+on+Land.+The+Hague%2C+18+October+1907.&amp;rft.pub=International+Committee+of+the+Red+Cross&amp;rft_id=http%3A%2F%2Fwww.icrc.org%2Fihl%2F385ec082b509e76c41256739003e636d%2F1d1726425f6955aec125641e0038bfd6%3FOpenDocument&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPaul_BattersbyJoseph_M._SiracusaSasho_Ripiloski2011" class="citation book cs1">Paul Battersby; Joseph M. Siracusa; Sasho Ripiloski (2011). <i>Crime Wars: The Global Intersection of Crime, Political Violence, and International Law</i>. <a href="/wiki/Praeger_Publishers" class="mw-redirect" title="Praeger Publishers">Greenwood Publishing Group</a>. p. 125.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Crime+Wars%3A+The+Global+Intersection+of+Crime%2C+Political+Violence%2C+and+International+Law&amp;rft.pages=125&amp;rft.pub=Greenwood+Publishing+Group&amp;rft.date=2011&amp;rft.au=Paul+Battersby&amp;rft.au=Joseph+M.+Siracusa&amp;rft.au=Sasho+Ripiloski&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCharlesworth2006" class="citation journal cs1">Charlesworth, Lorie (2006). "2 SAS Regiment, War Crimes Investigations, and British Intelligence: Intelligence Officials and the <i>Natzweiler Trial</i>". <i>The Journal of Intelligence History</i>. <b>6</b> (2): 41. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F16161262.2006.10555131">10.1080/16161262.2006.10555131</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:156655154">156655154</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Journal+of+Intelligence+History&amp;rft.atitle=2+SAS+Regiment%2C+War+Crimes+Investigations%2C+and+British+Intelligence%3A+Intelligence+Officials+and+the+Natzweiler+Trial&amp;rft.volume=6&amp;rft.issue=2&amp;rft.pages=41&amp;rft.date=2006&amp;rft_id=info%3Adoi%2F10.1080%2F16161262.2006.10555131&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A156655154%23id-name%3DS2CID&amp;rft.aulast=Charlesworth&amp;rft.aufirst=Lorie&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.icrc.org/customary-ihl/eng/docs/v2_cou_us_rule62">"United States of America, Practice Relating to Rule 62. Improper Use of Flags or Military Emblems, Insignia or Uniforms of the Adversary"</a>. <a href="/wiki/International_Committee_of_the_Red_Cross" title="International Committee of the Red Cross">International Committee of the Red Cross</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=United+States+of+America%2C+Practice+Relating+to+Rule+62.+Improper+Use+of+Flags+or+Military+Emblems%2C+Insignia+or+Uniforms+of+the+Adversary&amp;rft.pub=International+Committee+of+the+Red+Cross&amp;rft_id=http%3A%2F%2Fwww.icrc.org%2Fcustomary-ihl%2Feng%2Fdocs%2Fv2_cou_us_rule62&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://books.google.com/books?id=EBTul-duLEYC&amp;q=escaping%20POWs%20civilian%20clothes%20enemy%20uniforms&amp;pg=PA24"><i>2006 Operational Law Handbook</i></a>. DIANE. 2010. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781428910676" title="Special:BookSources/9781428910676"><bdi>9781428910676</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=2006+Operational+Law+Handbook&amp;rft.pub=DIANE&amp;rft.date=2010&amp;rft.isbn=9781428910676&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DEBTul-duLEYC%26q%3Descaping%2520POWs%2520civilian%2520clothes%2520enemy%2520uniforms%26pg%3DPA24&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLeslie_C._Green2000" class="citation book cs1">Leslie C. Green (2000). <i>The Contemporary Law Of Armed Conflict 2nd Edition</i>. Juris Publishing, Inc. p. 142. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-929446-03-2" title="Special:BookSources/978-1-929446-03-2"><bdi>978-1-929446-03-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Contemporary+Law+Of+Armed+Conflict+2nd+Edition&amp;rft.pages=142&amp;rft.pub=Juris+Publishing%2C+Inc.&amp;rft.date=2000&amp;rft.isbn=978-1-929446-03-2&amp;rft.au=Leslie+C.+Green&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGeorge_P._Fletcher2002" class="citation book cs1">George P. Fletcher (September 16, 2002). <span class="id-lock-registration" title="Free registration required"><a rel="nofollow" class="external text" href="https://archive.org/details/romanticsatwar00geor"><i>Romantics at War: Glory and Guilt in the Age of Terrorism</i></a></span>. <a href="/wiki/Princeton_University_Press" title="Princeton University Press">Princeton University Press</a>. p. <a rel="nofollow" class="external text" href="https://archive.org/details/romanticsatwar00geor/page/106">106</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780691006512" title="Special:BookSources/9780691006512"><bdi>9780691006512</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Romantics+at+War%3A+Glory+and+Guilt+in+the+Age+of+Terrorism&amp;rft.pages=106&amp;rft.pub=Princeton+University+Press&amp;rft.date=2002-09-16&amp;rft.isbn=9780691006512&amp;rft.au=George+P.+Fletcher&amp;rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fromanticsatwar00geor&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJ._H._W._Verziji1978" class="citation book cs1">J. H. W. Verziji (1978). <i>International Law in Historical Perspective: The laws of war. Part IX-A</i>. <a href="/wiki/Brill_Publishers" title="Brill Publishers">Brill Publishers</a>. p. 143. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-90-286-0148-2" title="Special:BookSources/978-90-286-0148-2"><bdi>978-90-286-0148-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=International+Law+in+Historical+Perspective%3A+The+laws+of+war.+Part+IX-A&amp;rft.pages=143&amp;rft.pub=Brill+Publishers&amp;rft.date=1978&amp;rft.isbn=978-90-286-0148-2&amp;rft.au=J.+H.+W.+Verziji&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130515214735/http://usmilitary.about.com/library/milinfo/mcm/bl106.htm">"UCMJ – Article 106 – Spies"</a>. <i>About.com US Military</i>. Archived from <a rel="nofollow" class="external text" href="http://usmilitary.about.com/library/milinfo/mcm/bl106.htm">the original</a> on 2013-05-15.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=About.com+US+Military&amp;rft.atitle=UCMJ+%E2%80%93+Article+106+%E2%80%93+Spies&amp;rft_id=http%3A%2F%2Fusmilitary.about.com%2Flibrary%2Fmilinfo%2Fmcm%2Fbl106.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text">Brett F. Woods, <i>Neutral Ground: A Political History of Espionage Fiction</i> (2008) <a rel="nofollow" class="external text" href="https://www.questia.com/library/120076034/neutral-ground-a-political-history-of-espionage">online</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190327091232/https://www.questia.com/library/120076034/neutral-ground-a-political-history-of-espionage">Archived</a> 2019-03-27 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text">Miller, Toby, <i>Spyscreen: Espionage on Film and TV from the 1930s to the 1960s</i> (Oxford University Press, 2003).</span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKatz2019" class="citation web cs1">Katz, Stan S. (2019). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190926154509/https://theemperorandthespy.com/books/the-emperor-and-the-spy/overview/">"The Emperor and the Spy"</a>. <i>TheEmperorAndTheSpy.com</i>. Archived from <a rel="nofollow" class="external text" href="https://theemperorandthespy.com/books/the-emperor-and-the-spy/overview/">the original</a> on 2019-09-26.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TheEmperorAndTheSpy.com&amp;rft.atitle=The+Emperor+and+the+Spy&amp;rft.date=2019&amp;rft.aulast=Katz&amp;rft.aufirst=Stan+S.&amp;rft_id=https%3A%2F%2Ftheemperorandthespy.com%2Fbooks%2Fthe-emperor-and-the-spy%2Foverview%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-58">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKatz2019" class="citation book cs1">Katz, Stan S. (2019). <i>The Emperor and the Spy</i>. Horizon Productions. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-9903349-4-1" title="Special:BookSources/978-0-9903349-4-1"><bdi>978-0-9903349-4-1</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Emperor+and+the+Spy&amp;rft.pub=Horizon+Productions&amp;rft.date=2019&amp;rft.isbn=978-0-9903349-4-1&amp;rft.aulast=Katz&amp;rft.aufirst=Stan+S.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLiulevicius2011" class="citation book cs1">Liulevicius, Vejas Gabriel (October 2011). <a rel="nofollow" class="external text" href="https://www.thegreatcourses.com/courses/espionage-and-covert-operations-a-global-history">"1. Introducing the Secret World"</a>. <i>Espionage and Covert Operations: A Global History</i>. The Great Courses. <q>Like the old adage about war, real spionage is most often made up of vast stretches of boredom punctuated by sharp moments of fear. [...] It has been said, with some justice that good tradecraft keeps espionage, routine, and boring, which is good, because excitement actually means that something has gone terribly wrong.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=1.+Introducing+the+Secret+World&amp;rft.btitle=Espionage+and+Covert+Operations%3A+A+Global+History&amp;rft.pub=The+Great+Courses&amp;rft.date=2011-10&amp;rft.aulast=Liulevicius&amp;rft.aufirst=Vejas+Gabriel&amp;rft_id=https%3A%2F%2Fwww.thegreatcourses.com%2Fcourses%2Fespionage-and-covert-operations-a-global-history&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading3"><h3 id="Works_cited">Works cited</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=27" title="Edit section: Works cited" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <ul><li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohnson1997" class="citation book cs1">Johnson, John (1997). <i>The Evolution of British Sigint, 1653–1939</i>. London: <a href="/wiki/HMSO" class="mw-redirect" title="HMSO">HMSO</a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/52130886">52130886</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Evolution+of+British+Sigint%2C+1653%E2%80%931939&amp;rft.place=London&amp;rft.pub=HMSO&amp;rft.date=1997&amp;rft_id=info%3Aoclcnum%2F52130886&amp;rft.aulast=Johnson&amp;rft.aufirst=John&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWinkler2009" class="citation journal cs1">Winkler, Jonathan Reed (July 2009). "Information Warfare in World War I". <i>The Journal of Military History</i>. <b>73</b> (3): <span class="nowrap">845–</span>867. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1353%2Fjmh.0.0324">10.1353/jmh.0.0324</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1543-7795">1543-7795</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:201749182">201749182</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Journal+of+Military+History&amp;rft.atitle=Information+Warfare+in+World+War+I&amp;rft.volume=73&amp;rft.issue=3&amp;rft.pages=%3Cspan+class%3D%22nowrap%22%3E845-%3C%2Fspan%3E867&amp;rft.date=2009-07&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A201749182%23id-name%3DS2CID&amp;rft.issn=1543-7795&amp;rft_id=info%3Adoi%2F10.1353%2Fjmh.0.0324&amp;rft.aulast=Winkler&amp;rft.aufirst=Jonathan+Reed&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span></li></ul> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(13)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=28" title="Edit section: Further reading" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-13 collapsible-block" id="mf-section-13"> <style data-mw-deduplicate="TemplateStyles:r1239549316">.mw-parser-output .refbegin{margin-bottom:0.5em}.mw-parser-output .refbegin-hanging-indents>ul{margin-left:0}.mw-parser-output .refbegin-hanging-indents>ul>li{margin-left:0;padding-left:3.2em;text-indent:-3.2em}.mw-parser-output .refbegin-hanging-indents ul,.mw-parser-output .refbegin-hanging-indents ul li{list-style:none}@media(max-width:720px){.mw-parser-output .refbegin-hanging-indents>ul>li{padding-left:1.6em;text-indent:-1.6em}}.mw-parser-output .refbegin-columns{margin-top:0.3em}.mw-parser-output .refbegin-columns ul{margin-top:0}.mw-parser-output .refbegin-columns li{page-break-inside:avoid;break-inside:avoid-column}@media screen{.mw-parser-output .refbegin{font-size:90%}}</style><div class="refbegin refbegin-columns references-column-width" style="column-width: 30em"> <ul><li>Aldrich, Richard J., and Christopher Andrew, eds. <i>Secret Intelligence: A Reader</i> (2nd ed. 2018); focus on the 21st century; reprints 30 essays by scholars. <a rel="nofollow" class="external text" href="https://www.amazon.com/dp/0415705681/">excerpt</a></li> <li><a href="/wiki/Christopher_Andrew_(historian)" title="Christopher Andrew (historian)">Andrew, Christopher</a>, <i>The Secret World: A History of Intelligence</i>, 2018.</li> <li><a href="/wiki/Frederick_Russell_Burnham" title="Frederick Russell Burnham">Burnham, Frederick Russell</a>, <i>Taking Chances</i>, 1944.</li> <li>Felix, Christopher [pseudonym for James McCarger] <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20221011135100/https://www.amazon.com/Fearless-Fascinating-Story-Secret-Medieval-ebook/dp/B072BM8WQ1"><i>Intelligence Literature: Suggested Reading List</i></a>. US CIA. Archived from <a rel="nofollow" class="external text" href="https://www.amazon.com/Fearless-Fascinating-Story-Secret-Medieval-ebook/dp/B072BM8WQ1/">the original</a> on October 11, 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">September 2,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Intelligence+Literature%3A+Suggested+Reading+List&amp;rft.pub=US+CIA&amp;rft_id=https%3A%2F%2Fwww.amazon.com%2FFearless-Fascinating-Story-Secret-Medieval-ebook%2Fdp%2FB072BM8WQ1%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AEspionage" class="Z3988"></span> <i>A Short Course in the Secret War, 4th Edition</i>. Madison Books, November 19, 2001.</li> <li>Friedman, George. <i>America's Secret War: Inside the Hidden Worldwide Struggle Between the United States and Its Enemies</i> 2005</li> <li><a href="/wiki/Adam_Gopnik" title="Adam Gopnik">Gopnik, Adam</a>, "Spy vs. Spy vs. Spy: How valuable is espionage?", <i><a href="/wiki/The_New_Yorker" title="The New Yorker">The New Yorker</a></i>, 2 September 2019, pp. 53–59. "There seems to be a paranoid paradox of espionage: the better your intelligence, the dumber your conduct; the more you know, the less you anticipate.... Hard-won information is ignored or wildly misinterpreted.... [It] happens again and again [that] a seeming national advance in intelligence is squandered through cross-bred confusion, political rivalry, mutual bureaucratic suspicions, intergovernmental competition, and fear of the press (as well as leaks to the press), all seasoned with dashes of sexual jealousy and adulterous intrigue." (p. 54.)</li> <li>Jeffreys-Jones, Rhodri. <i>In Spies, We Trust: The Story of Western Intelligence</i> (2013), covers U.S. and Britain</li> <li>Jenkins, Peter. <i>Surveillance Tradecraft: The Professional's Guide to Surveillance Training</i> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-9535378-2-2" title="Special:BookSources/978-0-9535378-2-2">978-0-9535378-2-2</a></li> <li><a href="/wiki/David_Kahn_(writer)" title="David Kahn (writer)">Kahn, David</a>, <i>The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet</i>, 1996 revised edition. First published 1967.</li> <li><a href="/wiki/John_Keegan" title="John Keegan">Keegan, John</a>, <i>Intelligence in War: Knowledge of the Enemy from Napoleon to Al-Qaeda</i>, 2003.</li> <li><a href="/wiki/Phillip_Knightley" title="Phillip Knightley">Knightley, Phillip</a>, <i>The Second Oldest Profession: Spies and Spying in the Twentieth Century</i>, Norton, 1986.</li> <li><a href="/wiki/Paul_Krugman" title="Paul Krugman">Krugman, Paul</a>, "The American Way of Economic war: Is Washington Overusing Its Most Powerful Weapons?" (review of <a href="/wiki/Henry_Farrell_(political_scientist)" title="Henry Farrell (political scientist)">Henry Farrell</a> and <a href="/wiki/Abraham_L._Newman" title="Abraham L. Newman">Abraham Newman</a>, <i>Underground Empire: How America Weaponized the World Economy</i>, Henry Holt, 2023, 288 pp.), <i><a href="/wiki/Foreign_Affairs" title="Foreign Affairs">Foreign Affairs</a></i>, vol. 103, no. 1 (January/February 2024), pp. 150–156. "The [U.S.] dollar is one of the few currencies that almost all major banks will accept, and... the most widely used... As a result, the dollar is the currency that many companies must use... to do international business." (p. 150.) "[L]ocal banks facilitating that trade... normally... buy U.S. dollars and then use dollars to buy [another local currency]. To do so, however, the banks must have access to the U.S. financial system and... follow rules laid out by Washington." (pp. 151–152.) "But there is another, lesser-known reason why the [U.S.] commands overwhelming economic power. Most of the world's <a href="/wiki/Fiber-optic_cables" class="mw-redirect" title="Fiber-optic cables">fiber-optic cables</a>, which carry data and messages around the planet, travel through the United States." (p. 152.) "[T]he U.S. government has installed 'splitters': <a href="/wiki/Prism_(optics)" title="Prism (optics)">prisms</a> that divide the beams of light carrying information into two streams. One... goes on to the intended recipients, ... the other goes to the <a href="/wiki/National_Security_Administration" class="mw-redirect" title="National Security Administration">National Security Agency</a>, which then uses high-powered <a href="/wiki/Computation" title="Computation">computation</a> to analyze the data. As a result, the [U.S.] can monitor almost all international communication." (p. 154) This has allowed the U.S. "to effectively cut <a href="/wiki/Iran" title="Iran">Iran</a> out of the world financial system... Iran's economy stagnated... Eventually, Tehran agreed to cut back its <a href="/wiki/Nuclear_reactor" title="Nuclear reactor">nuclear</a> programs in exchange for relief." (pp. 153–154.) "[A] few years ago, American officials... were in a panic about [the Chinese company] <a href="/wiki/Huawei" title="Huawei">Huawei</a>... which... seemed poised to supply <a href="/wiki/5G" title="5G">5G</a> equipment to much of the planet [thereby possibly] giv[ing] China the power to eavesdrop on the rest of the world – just as the [U.S.] has done.... The [U.S.] learned that Huawei had been dealing surreptitiously with Iran – and therefore violating U.S. sanctions. Then, it... used its special access to information on international bank data to [show] that [Huawei]'s <a href="/wiki/Chief_financial_officer" title="Chief financial officer">chief financial officer</a>, <a href="/wiki/Meng_Wanzhou" title="Meng Wanzhou">Meng Wanzhou</a> (... the founder's daughter), had committed <a href="/wiki/Bank_fraud" title="Bank fraud">bank fraud</a> by falsely telling the British <a href="/wiki/Financial_services_company" class="mw-redirect" title="Financial services company">financial services company</a> <a href="/wiki/HSBC" title="HSBC">HSBC</a> that her company was not doing business with Iran. Canadian authorities, acting on a U.S. request, arrested her... in December 2018. After... almost three years under house arrest... Meng... was allowed to return to China... But by [then] the prospects for Chinese dominance of 5G had vanished..." (pp. 154–155.) Farrell and Newman, writes Krugman, "are worried about the possibility of [U.S. <i>Underground Empire</i>] overreach. [I]f the [U.S.] weaponizes the dollar against too many countries, they might... band together and adopt alternative methods of international payment. If countries become deeply worried about U.S. spying, they could lay fiber-optic cables that bypass the [U.S.]. And if Washington puts too many restrictions on American exports, foreign firms might turn away from U.S. technology." (p. 155.)</li> <li>Lerner, Brenda Wilmoth &amp; K. Lee Lerner, eds. <i>Terrorism: essential primary sources</i> Thomas Gale 2006 <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-4144-0621-3" title="Special:BookSources/978-1-4144-0621-3">978-1-4144-0621-3</a></li> <li>Lerner, K. Lee and Brenda Wilmoth Lerner, eds. <i>Encyclopedia of Espionage, Intelligence and Security</i> (2003), worldwide recent coverage 1100 pages.</li> <li>May, Ernest R. (ed.). <i>Knowing One's Enemies: Intelligence Assessment Before the Two World Wars</i> (1984).</li> <li>O'Toole, George. <i>Honorable Treachery: A History of U.S. Intelligence, Espionage, Covert Action from the American Revolution to the CIA</i> 1991</li> <li>Murray, Williamson, and Allan Reed Millett, eds. <i>Calculations: net assessment and the coming of World War II</i> (1992).</li> <li>Owen, David. <i>Hidden Secrets: A Complete History of Espionage and the Technology Used to Support It</i></li> <li>Richelson, Jeffery T. <i>A Century of Spies: Intelligence in the Twentieth Century</i> (1977)</li> <li>Richelson, Jeffery T. <i>The U.S. Intelligence Community</i> (1999, fourth edition)</li> <li>Shaw, Tamsin, "Ethical Espionage" (review of Calder Walton, <i>Spies: The Epic Intelligence War Between East and West</i>, Simon and Schuster, 2023, 672 pp.; and <a href="/wiki/C%C3%A9cile_Fabre" title="Cécile Fabre">Cécile Fabre</a>, <i>Spying Through a Glass Darkly: The Ethics of Espionage and Counter-Intelligence</i>, Oxford University Press, 251 pp., 2024), <i><a href="/wiki/The_New_York_Review_of_Books" title="The New York Review of Books">The New York Review of Books</a></i>, vol. LXXI, no. 2 (8 February 2024), pp. 32, 34–35. "[I]n Walton's view, there was scarcely a US <a href="/wiki/Covert_operation" title="Covert operation">covert action</a> that was a long-term strategic success, with the possible exception of intervention in the <a href="/wiki/Soviet-Afghan_War" class="mw-redirect" title="Soviet-Afghan War">Soviet-Afghan War</a> (a disastrous military fiasco for the <a href="/wiki/Soviet_Union" title="Soviet Union">Soviets</a>) and perhaps support for the anti-Soviet <a href="/wiki/Solidarity_(Polish_trade_union)" title="Solidarity (Polish trade union)">Solidarity movement</a> in <a href="/wiki/Poland" title="Poland">Poland</a>." (p. 34.)</li> <li>Smith, W. Thomas Jr. <i><a href="/wiki/Encyclopedia_of_the_Central_Intelligence_Agency" title="Encyclopedia of the Central Intelligence Agency">Encyclopedia of the Central Intelligence Agency</a></i> (2003)</li> <li><a href="/wiki/Barbara_Tuchman" class="mw-redirect" title="Barbara Tuchman">Tuchman, Barbara W.</a>, <i>The Zimmermann Telegram</i>, New York, Macmillan, 1962.</li> <li>Warner, Michael. <i>The Rise and Fall of Intelligence: An International Security History</i> (2014)</li> <li>Zegart, Amy B. <i>Spies, Lies, and Algorithms: The History and Future of American Intelligence</i> (2022), university textbook. <a rel="nofollow" class="external text" href="https://issforum.org/to/ir14-5">online reviews</a></li></ul> </div> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(14)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="External_links">External links</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Espionage&amp;action=edit&amp;section=29" title="Edit section: External links" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-14 collapsible-block" id="mf-section-14"> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><a href="/wiki/File:Commons-logo.svg" class="mw-file-description"><noscript><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/40px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" data-file-width="1024" data-file-height="1376"></noscript><span class="lazy-image-placeholder" style="width: 30px;height: 40px;" data-mw-src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/40px-Commons-logo.svg.png" data-alt="" data-width="30" data-height="40" data-mw-srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/60px-Commons-logo.svg.png 1.5x" data-class="mw-file-element">&nbsp;</span></a></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:Espionage" class="extiw" title="commons:Category:Espionage">Espionage</a></span>.</div></div> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1235681985"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1237033735"><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><a href="/wiki/File:Wikiquote-logo.svg" class="mw-file-description"><noscript><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/fa/Wikiquote-logo.svg/34px-Wikiquote-logo.svg.png" decoding="async" width="34" height="40" class="mw-file-element" data-file-width="300" data-file-height="355"></noscript><span class="lazy-image-placeholder" style="width: 34px;height: 40px;" data-mw-src="//upload.wikimedia.org/wikipedia/commons/thumb/f/fa/Wikiquote-logo.svg/34px-Wikiquote-logo.svg.png" data-alt="" data-width="34" data-height="40" data-mw-srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/fa/Wikiquote-logo.svg/51px-Wikiquote-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/fa/Wikiquote-logo.svg/68px-Wikiquote-logo.svg.png 2x" data-class="mw-file-element">&nbsp;</span></a></span></div> <div class="side-box-text plainlist">Wikiquote has quotations related to <i><b><a href="https://en.wikiquote.org/wiki/Special:Search/Espionage" class="extiw" title="q:Special:Search/Espionage">Espionage</a></b></i>.</div></div> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1235681985"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1237033735"><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><a href="/wiki/File:Wiktionary-logo-en-v2.svg" class="mw-file-description"><noscript><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/40px-Wiktionary-logo-en-v2.svg.png" decoding="async" width="40" height="40" class="mw-file-element" data-file-width="512" data-file-height="512"></noscript><span class="lazy-image-placeholder" style="width: 40px;height: 40px;" data-mw-src="//upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/40px-Wiktionary-logo-en-v2.svg.png" data-alt="" data-width="40" data-height="40" data-mw-srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/60px-Wiktionary-logo-en-v2.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/120px-Wiktionary-logo-en-v2.svg.png 2x" data-class="mw-file-element">&nbsp;</span></a></span></div> <div class="side-box-text plainlist">Look up <i><b><a href="https://en.wiktionary.org/wiki/Special:Search/espionage" class="extiw" title="wiktionary:Special:Search/espionage">espionage</a></b></i> in Wiktionary, the free dictionary.</div></div> </div> <ul><li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20140820053730/http://konstantynowicz.info/family_history_genealogy_historia_rodzina_genealogia/Italy_UK_Switzerland_Estonia_Sweden_Belarus_Russia_Poland_France/Belarusian_Estonian_Polish_Russian_genealogical_historical_database/Europe_1789_1815_1914_1917_1937/1989/index.html">History of an espionage in Russia</a></li></ul> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><style data-mw-deduplicate="TemplateStyles:r1066933788">.mw-parser-output .excerpt-hat .mw-editsection-like{font-style:normal}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><style data-mw-deduplicate="TemplateStyles:r1266661725">.mw-parser-output .portalbox{padding:0;margin:0.5em 0;display:table;box-sizing:border-box;max-width:175px;list-style:none}.mw-parser-output .portalborder{border:1px solid var(--border-color-base,#a2a9b1);padding:0.1em;background:var(--background-color-neutral-subtle,#f8f9fa)}.mw-parser-output .portalbox-entry{display:table-row;font-size:85%;line-height:110%;height:1.9em;font-style:italic;font-weight:bold}.mw-parser-output .portalbox-image{display:table-cell;padding:0.2em;vertical-align:middle;text-align:center}.mw-parser-output .portalbox-link{display:table-cell;padding:0.2em 0.2em 0.2em 0.3em;vertical-align:middle}@media(min-width:720px){.mw-parser-output .portalleft{margin:0.5em 1em 0.5em 0}.mw-parser-output .portalright{clear:right;float:right;margin:0.5em 0 0.5em 1em}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><style data-mw-deduplicate="TemplateStyles:r1038841319">.mw-parser-output .tooltip-dotted{border-bottom:1px dotted;cursor:help}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1038841319"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1038841319"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1038841319"></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐5c6f46dcf‐k799j Cached time: 20250330081441 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.126 seconds Real time usage: 1.330 seconds Preprocessor visited node count: 7825/1000000 Post‐expand include size: 271588/2097152 bytes Template argument size: 13029/2097152 bytes Highest expansion depth: 15/100 Expensive parser function count: 24/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 265327/5000000 bytes Lua time usage: 0.683/10.000 seconds Lua memory usage: 8022495/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1069.165 1 -total 25.83% 276.161 1 Template:Reflist 23.98% 256.417 8 Template:Navbox 19.87% 212.418 1 Template:Types_of_crime 17.83% 190.586 8 Template:Excerpt 12.79% 136.800 25 Template:Cite_web 7.65% 81.822 1 Template:Intelligence 7.39% 78.981 1 Template:Sidebar 6.77% 72.392 1 Template:Short_description 5.53% 59.155 3 Template:Sister_project --> <!-- Saved in parser cache with key enwiki:pcache:10501:|#|:idhash:canonical and timestamp 20250330081441 and revision id 1280238048. Rendering was triggered because: page-view --> </section></div> <!-- MobileFormatter took 0.031 seconds --><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?useformat=mobile&amp;type=1x1&amp;usesul3=0" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Espionage&amp;oldid=1280238048">https://en.wikipedia.org/w/index.php?title=Espionage&amp;oldid=1280238048</a>"</div></div> </div> <div class="post-content" id="page-secondary-actions"> </div> </main> <footer class="mw-footer minerva-footer" role="contentinfo"> <a class="last-modified-bar" href="/w/index.php?title=Espionage&amp;action=history"> <div class="post-content last-modified-bar__content"> <span class="minerva-icon minerva-icon-size-medium minerva-icon--modified-history"></span> <span class="last-modified-bar__text modified-enhancement" data-user-name="195.188.173.45" data-user-gender="unknown" data-timestamp="1741865665"> <span>Last edited on 13 March 2025, at 11:34</span> </span> <span class="minerva-icon minerva-icon-size-small minerva-icon--expand"></span> </div> </a> <div class="post-content footer-content"> <div id='mw-data-after-content'> <div class="read-more-container"></div> </div> <div id="p-lang"> <h4>Languages</h4> <section> <ul id="p-variants" class="minerva-languages"></ul> <ul class="minerva-languages"><li class="interlanguage-link interwiki-af mw-list-item"><a href="https://af.wikipedia.org/wiki/Spioenasie" title="Spioenasie – Afrikaans" lang="af" hreflang="af" data-title="Spioenasie" data-language-autonym="Afrikaans" data-language-local-name="Afrikaans" class="interlanguage-link-target"><span>Afrikaans</span></a></li><li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%AA%D8%AC%D8%B3%D8%B3" title="تجسس – Arabic" lang="ar" hreflang="ar" data-title="تجسس" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ast mw-list-item"><a href="https://ast.wikipedia.org/wiki/Espionaxe" title="Espionaxe – Asturian" lang="ast" hreflang="ast" data-title="Espionaxe" data-language-autonym="Asturianu" data-language-local-name="Asturian" class="interlanguage-link-target"><span>Asturianu</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Casusluq" title="Casusluq – Azerbaijani" lang="az" hreflang="az" data-title="Casusluq" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-bn mw-list-item"><a href="https://bn.wikipedia.org/wiki/%E0%A6%97%E0%A7%81%E0%A6%AA%E0%A7%8D%E0%A6%A4%E0%A6%9A%E0%A6%B0%E0%A6%AC%E0%A7%83%E0%A6%A4%E0%A7%8D%E0%A6%A4%E0%A6%BF" title="গুপ্তচরবৃত্তি – Bangla" lang="bn" hreflang="bn" data-title="গুপ্তচরবৃত্তি" data-language-autonym="বাংলা" data-language-local-name="Bangla" class="interlanguage-link-target"><span>বাংলা</span></a></li><li class="interlanguage-link interwiki-zh-min-nan mw-list-item"><a href="https://zh-min-nan.wikipedia.org/wiki/K%C3%A0n-tia%CC%8Dp" title="Kàn-tia̍p – Minnan" lang="nan" hreflang="nan" data-title="Kàn-tia̍p" data-language-autonym="閩南語 / Bân-lâm-gú" data-language-local-name="Minnan" class="interlanguage-link-target"><span>閩南語 / Bân-lâm-gú</span></a></li><li class="interlanguage-link interwiki-ba mw-list-item"><a href="https://ba.wikipedia.org/wiki/%D0%A8%D0%BF%D0%B8%D0%BE%D0%BD%D0%B0%D0%B6" title="Шпионаж – Bashkir" lang="ba" hreflang="ba" data-title="Шпионаж" data-language-autonym="Башҡортса" data-language-local-name="Bashkir" class="interlanguage-link-target"><span>Башҡортса</span></a></li><li class="interlanguage-link interwiki-be mw-list-item"><a href="https://be.wikipedia.org/wiki/%D0%A8%D0%BF%D1%96%D1%8F%D0%BD%D0%B0%D0%B6" title="Шпіянаж – Belarusian" lang="be" hreflang="be" data-title="Шпіянаж" data-language-autonym="Беларуская" data-language-local-name="Belarusian" class="interlanguage-link-target"><span>Беларуская</span></a></li><li class="interlanguage-link interwiki-be-x-old mw-list-item"><a href="https://be-tarask.wikipedia.org/wiki/%D0%A8%D0%BF%D1%96%D1%8F%D0%BD%D0%B0%D0%B6" title="Шпіянаж – Belarusian (Taraškievica orthography)" lang="be-tarask" hreflang="be-tarask" data-title="Шпіянаж" data-language-autonym="Беларуская (тарашкевіца)" data-language-local-name="Belarusian (Taraškievica orthography)" class="interlanguage-link-target"><span>Беларуская (тарашкевіца)</span></a></li><li class="interlanguage-link interwiki-bg mw-list-item"><a href="https://bg.wikipedia.org/wiki/%D0%A8%D0%BF%D0%B8%D0%BE%D0%BD%D0%B0%D0%B6" title="Шпионаж – Bulgarian" lang="bg" hreflang="bg" data-title="Шпионаж" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-bo mw-list-item"><a href="https://bo.wikipedia.org/wiki/%E0%BD%89%E0%BD%B4%E0%BD%A3%E0%BC%8B%E0%BD%9E%E0%BD%B2%E0%BD%96%E0%BC%8B%E0%BD%94%E0%BC%8D" title="ཉུལ་ཞིབ་པ། – Tibetan" lang="bo" hreflang="bo" data-title="ཉུལ་ཞིབ་པ།" data-language-autonym="བོད་ཡིག" data-language-local-name="Tibetan" class="interlanguage-link-target"><span>བོད་ཡིག</span></a></li><li class="interlanguage-link interwiki-bs mw-list-item"><a href="https://bs.wikipedia.org/wiki/%C5%A0pijuna%C5%BEa" title="Špijunaža – Bosnian" lang="bs" hreflang="bs" data-title="Špijunaža" data-language-autonym="Bosanski" data-language-local-name="Bosnian" class="interlanguage-link-target"><span>Bosanski</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Espionatge" title="Espionatge – Catalan" lang="ca" hreflang="ca" data-title="Espionatge" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/%C5%A0pion%C3%A1%C5%BE" title="Špionáž – Czech" lang="cs" hreflang="cs" data-title="Špionáž" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-cy mw-list-item"><a href="https://cy.wikipedia.org/wiki/Ysb%C3%AFwriaeth" title="Ysbïwriaeth – Welsh" lang="cy" hreflang="cy" data-title="Ysbïwriaeth" data-language-autonym="Cymraeg" data-language-local-name="Welsh" class="interlanguage-link-target"><span>Cymraeg</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Spionage" title="Spionage – Danish" lang="da" hreflang="da" data-title="Spionage" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Spionage" title="Spionage – German" lang="de" hreflang="de" data-title="Spionage" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Luure" title="Luure – Estonian" lang="et" hreflang="et" data-title="Luure" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%9A%CE%B1%CF%84%CE%B1%CF%83%CE%BA%CE%BF%CF%80%CE%B5%CE%AF%CE%B1" title="Κατασκοπεία – Greek" lang="el" hreflang="el" data-title="Κατασκοπεία" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Espionaje" title="Espionaje – Spanish" lang="es" hreflang="es" data-title="Espionaje" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eo mw-list-item"><a href="https://eo.wikipedia.org/wiki/Spionado" title="Spionado – Esperanto" lang="eo" hreflang="eo" data-title="Spionado" data-language-autonym="Esperanto" data-language-local-name="Esperanto" class="interlanguage-link-target"><span>Esperanto</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Espioitza" title="Espioitza – Basque" lang="eu" hreflang="eu" data-title="Espioitza" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%AC%D8%A7%D8%B3%D9%88%D8%B3%DB%8C" title="جاسوسی – Persian" lang="fa" hreflang="fa" data-title="جاسوسی" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr badge-Q70894304 mw-list-item" title=""><a href="https://fr.wikipedia.org/wiki/Espionner" title="Espionner – French" lang="fr" hreflang="fr" data-title="Espionner" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ga mw-list-item"><a href="https://ga.wikipedia.org/wiki/Spiaireacht" title="Spiaireacht – Irish" lang="ga" hreflang="ga" data-title="Spiaireacht" data-language-autonym="Gaeilge" data-language-local-name="Irish" class="interlanguage-link-target"><span>Gaeilge</span></a></li><li class="interlanguage-link interwiki-gl mw-list-item"><a href="https://gl.wikipedia.org/wiki/Espionaxe" title="Espionaxe – Galician" lang="gl" hreflang="gl" data-title="Espionaxe" data-language-autonym="Galego" data-language-local-name="Galician" class="interlanguage-link-target"><span>Galego</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EA%B0%84%EC%B2%A9_%ED%96%89%EC%9C%84" title="간첩 행위 – Korean" lang="ko" hreflang="ko" data-title="간첩 행위" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hy mw-list-item"><a href="https://hy.wikipedia.org/wiki/%D4%BC%D6%80%D5%BF%D5%A5%D5%BD%D5%B8%D6%82%D5%A9%D5%B5%D5%B8%D6%82%D5%B6" title="Լրտեսություն – Armenian" lang="hy" hreflang="hy" data-title="Լրտեսություն" data-language-autonym="Հայերեն" data-language-local-name="Armenian" class="interlanguage-link-target"><span>Հայերեն</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%97%E0%A5%81%E0%A4%AA%E0%A5%8D%E0%A4%A4%E0%A4%9A%E0%A4%B0%E0%A5%8D%E0%A4%AF%E0%A4%BE" title="गुप्तचर्या – Hindi" lang="hi" hreflang="hi" data-title="गुप्तचर्या" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-hr mw-list-item"><a href="https://hr.wikipedia.org/wiki/%C5%A0pijuna%C5%BEa" title="Špijunaža – Croatian" lang="hr" hreflang="hr" data-title="Špijunaža" data-language-autonym="Hrvatski" data-language-local-name="Croatian" class="interlanguage-link-target"><span>Hrvatski</span></a></li><li class="interlanguage-link interwiki-io mw-list-item"><a href="https://io.wikipedia.org/wiki/Spionado" title="Spionado – Ido" lang="io" hreflang="io" data-title="Spionado" data-language-autonym="Ido" data-language-local-name="Ido" class="interlanguage-link-target"><span>Ido</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Spionase" title="Spionase – Indonesian" lang="id" hreflang="id" data-title="Spionase" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-is mw-list-item"><a href="https://is.wikipedia.org/wiki/Nj%C3%B3snir" title="Njósnir – Icelandic" lang="is" hreflang="is" data-title="Njósnir" data-language-autonym="Íslenska" data-language-local-name="Icelandic" class="interlanguage-link-target"><span>Íslenska</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Spionaggio" title="Spionaggio – Italian" lang="it" hreflang="it" data-title="Spionaggio" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%A8%D7%99%D7%92%D7%95%D7%9C" title="ריגול – Hebrew" lang="he" hreflang="he" data-title="ריגול" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-jv mw-list-item"><a href="https://jv.wikipedia.org/wiki/Telik_sandhi" title="Telik sandhi – Javanese" lang="jv" hreflang="jv" data-title="Telik sandhi" data-language-autonym="Jawa" data-language-local-name="Javanese" class="interlanguage-link-target"><span>Jawa</span></a></li><li class="interlanguage-link interwiki-kn mw-list-item"><a href="https://kn.wikipedia.org/wiki/%E0%B2%97%E0%B3%82%E0%B2%A2%E0%B2%9A%E0%B2%B0%E0%B3%8D%E0%B2%AF%E0%B3%86" title="ಗೂಢಚರ್ಯೆ – Kannada" lang="kn" hreflang="kn" data-title="ಗೂಢಚರ್ಯೆ" data-language-autonym="ಕನ್ನಡ" data-language-local-name="Kannada" class="interlanguage-link-target"><span>ಕನ್ನಡ</span></a></li><li class="interlanguage-link interwiki-krc mw-list-item"><a href="https://krc.wikipedia.org/wiki/%D0%A8%D0%BF%D0%B8%D0%BE%D0%BD" title="Шпион – Karachay-Balkar" lang="krc" hreflang="krc" data-title="Шпион" data-language-autonym="Къарачай-малкъар" data-language-local-name="Karachay-Balkar" class="interlanguage-link-target"><span>Къарачай-малкъар</span></a></li><li class="interlanguage-link interwiki-ka mw-list-item"><a href="https://ka.wikipedia.org/wiki/%E1%83%A8%E1%83%9E%E1%83%98%E1%83%9D%E1%83%9C%E1%83%90%E1%83%9F%E1%83%98" title="შპიონაჟი – Georgian" lang="ka" hreflang="ka" data-title="შპიონაჟი" data-language-autonym="ქართული" data-language-local-name="Georgian" class="interlanguage-link-target"><span>ქართული</span></a></li><li class="interlanguage-link interwiki-kk mw-list-item"><a href="https://kk.wikipedia.org/wiki/%D0%A2%D1%8B%D2%A3%D1%88%D1%8B%D0%BB%D1%8B%D2%9B" title="Тыңшылық – Kazakh" lang="kk" hreflang="kk" data-title="Тыңшылық" data-language-autonym="Қазақша" data-language-local-name="Kazakh" class="interlanguage-link-target"><span>Қазақша</span></a></li><li class="interlanguage-link interwiki-ku mw-list-item"><a href="https://ku.wikipedia.org/wiki/Xefn%C3%AAr%C3%AE" title="Xefnêrî – Kurdish" lang="ku" hreflang="ku" data-title="Xefnêrî" data-language-autonym="Kurdî" data-language-local-name="Kurdish" class="interlanguage-link-target"><span>Kurdî</span></a></li><li class="interlanguage-link interwiki-ky mw-list-item"><a href="https://ky.wikipedia.org/wiki/%D0%A8%D0%BF%D0%B8%D0%BE%D0%BD%D0%B0%D0%B6_(%D1%82%D1%8B%D2%A3%D1%87%D1%8B%D0%BB%D1%8B%D0%BA)" title="Шпионаж (тыңчылык) – Kyrgyz" lang="ky" hreflang="ky" data-title="Шпионаж (тыңчылык)" data-language-autonym="Кыргызча" data-language-local-name="Kyrgyz" class="interlanguage-link-target"><span>Кыргызча</span></a></li><li class="interlanguage-link interwiki-lv mw-list-item"><a href="https://lv.wikipedia.org/wiki/Spiego%C5%A1ana" title="Spiegošana – Latvian" lang="lv" hreflang="lv" data-title="Spiegošana" data-language-autonym="Latviešu" data-language-local-name="Latvian" class="interlanguage-link-target"><span>Latviešu</span></a></li><li class="interlanguage-link interwiki-lb mw-list-item"><a href="https://lb.wikipedia.org/wiki/Spionage" title="Spionage – Luxembourgish" lang="lb" hreflang="lb" data-title="Spionage" data-language-autonym="Lëtzebuergesch" data-language-local-name="Luxembourgish" class="interlanguage-link-target"><span>Lëtzebuergesch</span></a></li><li class="interlanguage-link interwiki-lt mw-list-item"><a href="https://lt.wikipedia.org/wiki/%C5%BDvalgyba" title="Žvalgyba – Lithuanian" lang="lt" hreflang="lt" data-title="Žvalgyba" data-language-autonym="Lietuvių" data-language-local-name="Lithuanian" class="interlanguage-link-target"><span>Lietuvių</span></a></li><li class="interlanguage-link interwiki-hu mw-list-item"><a href="https://hu.wikipedia.org/wiki/K%C3%A9mked%C3%A9s_(b%C5%B1ncselekm%C3%A9ny)" title="Kémkedés (bűncselekmény) – Hungarian" lang="hu" hreflang="hu" data-title="Kémkedés (bűncselekmény)" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-mk mw-list-item"><a href="https://mk.wikipedia.org/wiki/%D0%A8%D0%BF%D0%B8%D0%BE%D0%BD%D0%B0%D0%B6%D0%B0" title="Шпионажа – Macedonian" lang="mk" hreflang="mk" data-title="Шпионажа" data-language-autonym="Македонски" data-language-local-name="Macedonian" class="interlanguage-link-target"><span>Македонски</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Pengintipan" title="Pengintipan – Malay" lang="ms" hreflang="ms" data-title="Pengintipan" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-mn mw-list-item"><a href="https://mn.wikipedia.org/wiki/%D0%A2%D0%B0%D0%B3%D0%BD%D1%83%D1%83%D0%BB" title="Тагнуул – Mongolian" lang="mn" hreflang="mn" data-title="Тагнуул" data-language-autonym="Монгол" data-language-local-name="Mongolian" class="interlanguage-link-target"><span>Монгол</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Spionage" title="Spionage – Dutch" lang="nl" hreflang="nl" data-title="Spionage" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-nds-nl mw-list-item"><a href="https://nds-nl.wikipedia.org/wiki/Spionage" title="Spionage – Low Saxon" lang="nds-NL" hreflang="nds-NL" data-title="Spionage" data-language-autonym="Nedersaksies" data-language-local-name="Low Saxon" class="interlanguage-link-target"><span>Nedersaksies</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E8%AB%9C%E5%A0%B1" title="諜報 – Japanese" lang="ja" hreflang="ja" data-title="諜報" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Spionasje" title="Spionasje – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Spionasje" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-nn mw-list-item"><a href="https://nn.wikipedia.org/wiki/Spionasje" title="Spionasje – Norwegian Nynorsk" lang="nn" hreflang="nn" data-title="Spionasje" data-language-autonym="Norsk nynorsk" data-language-local-name="Norwegian Nynorsk" class="interlanguage-link-target"><span>Norsk nynorsk</span></a></li><li class="interlanguage-link interwiki-uz mw-list-item"><a href="https://uz.wikipedia.org/wiki/Josuslik" title="Josuslik – Uzbek" lang="uz" hreflang="uz" data-title="Josuslik" data-language-autonym="Oʻzbekcha / ўзбекча" data-language-local-name="Uzbek" class="interlanguage-link-target"><span>Oʻzbekcha / ўзбекча</span></a></li><li class="interlanguage-link interwiki-pnb mw-list-item"><a href="https://pnb.wikipedia.org/wiki/%D8%AC%D8%B3%D9%88%D8%B3%DB%8C" title="جسوسی – Western Punjabi" lang="pnb" hreflang="pnb" data-title="جسوسی" data-language-autonym="پنجابی" data-language-local-name="Western Punjabi" class="interlanguage-link-target"><span>پنجابی</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Szpiegostwo" title="Szpiegostwo – Polish" lang="pl" hreflang="pl" data-title="Szpiegostwo" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Espionagem" title="Espionagem – Portuguese" lang="pt" hreflang="pt" data-title="Espionagem" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Spionaj" title="Spionaj – Romanian" lang="ro" hreflang="ro" data-title="Spionaj" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%A8%D0%BF%D0%B8%D0%BE%D0%BD%D0%B0%D0%B6" title="Шпионаж – Russian" lang="ru" hreflang="ru" data-title="Шпионаж" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sah mw-list-item"><a href="https://sah.wikipedia.org/wiki/%D2%AE%D1%81%D0%BF%D2%AF%D0%B9%D2%AF%D3%A9%D0%BD%D0%BD%D1%8D%D1%8D%D2%BB%D0%B8%D0%BD" title="Үспүйүөннээһин – Yakut" lang="sah" hreflang="sah" data-title="Үспүйүөннээһин" data-language-autonym="Саха тыла" data-language-local-name="Yakut" class="interlanguage-link-target"><span>Саха тыла</span></a></li><li class="interlanguage-link interwiki-sco mw-list-item"><a href="https://sco.wikipedia.org/wiki/Espionage" title="Espionage – Scots" lang="sco" hreflang="sco" data-title="Espionage" data-language-autonym="Scots" data-language-local-name="Scots" class="interlanguage-link-target"><span>Scots</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/Spiunazhi" title="Spiunazhi – Albanian" lang="sq" hreflang="sq" data-title="Spiunazhi" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-scn mw-list-item"><a href="https://scn.wikipedia.org/wiki/Spiunaggiu" title="Spiunaggiu – Sicilian" lang="scn" hreflang="scn" data-title="Spiunaggiu" data-language-autonym="Sicilianu" data-language-local-name="Sicilian" class="interlanguage-link-target"><span>Sicilianu</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Espionage" title="Espionage – Simple English" lang="en-simple" hreflang="en-simple" data-title="Espionage" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sd mw-list-item"><a href="https://sd.wikipedia.org/wiki/%D8%AC%D8%A7%D8%B3%D9%88%D8%B3%D9%8A" title="جاسوسي – Sindhi" lang="sd" hreflang="sd" data-title="جاسوسي" data-language-autonym="سنڌي" data-language-local-name="Sindhi" class="interlanguage-link-target"><span>سنڌي</span></a></li><li class="interlanguage-link interwiki-sk mw-list-item"><a href="https://sk.wikipedia.org/wiki/%C5%A0pion%C3%A1%C5%BE" title="Špionáž – Slovak" lang="sk" hreflang="sk" data-title="Špionáž" data-language-autonym="Slovenčina" data-language-local-name="Slovak" class="interlanguage-link-target"><span>Slovenčina</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Vohunstvo" title="Vohunstvo – Slovenian" lang="sl" hreflang="sl" data-title="Vohunstvo" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-ckb mw-list-item"><a href="https://ckb.wikipedia.org/wiki/%D8%B3%DB%8C%D8%AE%D9%88%DA%95%DB%8C" title="سیخوڕی – Central Kurdish" lang="ckb" hreflang="ckb" data-title="سیخوڕی" data-language-autonym="کوردی" data-language-local-name="Central Kurdish" class="interlanguage-link-target"><span>کوردی</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%A8%D0%BF%D0%B8%D1%98%D1%83%D0%BD%D0%B0%D0%B6%D0%B0" title="Шпијунажа – Serbian" lang="sr" hreflang="sr" data-title="Шпијунажа" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-sh mw-list-item"><a href="https://sh.wikipedia.org/wiki/%C5%A0pijuna%C5%BEa" title="Špijunaža – Serbo-Croatian" lang="sh" hreflang="sh" data-title="Špijunaža" data-language-autonym="Srpskohrvatski / српскохрватски" data-language-local-name="Serbo-Croatian" class="interlanguage-link-target"><span>Srpskohrvatski / српскохрватски</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Vakoilu" title="Vakoilu – Finnish" lang="fi" hreflang="fi" data-title="Vakoilu" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Spioneri" title="Spioneri – Swedish" lang="sv" hreflang="sv" data-title="Spioneri" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-tl mw-list-item"><a href="https://tl.wikipedia.org/wiki/Espiyonahe" title="Espiyonahe – Tagalog" lang="tl" hreflang="tl" data-title="Espiyonahe" data-language-autonym="Tagalog" data-language-local-name="Tagalog" class="interlanguage-link-target"><span>Tagalog</span></a></li><li class="interlanguage-link interwiki-te mw-list-item"><a href="https://te.wikipedia.org/wiki/%E0%B0%97%E0%B1%82%E0%B0%A2%E0%B0%9A%E0%B0%B0%E0%B1%8D%E0%B0%AF%E0%B0%82" title="గూఢచర్యం – Telugu" lang="te" hreflang="te" data-title="గూఢచర్యం" data-language-autonym="తెలుగు" data-language-local-name="Telugu" class="interlanguage-link-target"><span>తెలుగు</span></a></li><li class="interlanguage-link interwiki-th mw-list-item"><a href="https://th.wikipedia.org/wiki/%E0%B8%88%E0%B8%B2%E0%B8%A3%E0%B8%81%E0%B8%A3%E0%B8%A3%E0%B8%A1" title="จารกรรม – Thai" lang="th" hreflang="th" data-title="จารกรรม" data-language-autonym="ไทย" data-language-local-name="Thai" class="interlanguage-link-target"><span>ไทย</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Casusluk" title="Casusluk – Turkish" lang="tr" hreflang="tr" data-title="Casusluk" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%A8%D0%BF%D0%B8%D0%B3%D1%83%D0%BD%D1%81%D1%82%D0%B2%D0%BE" title="Шпигунство – Ukrainian" lang="uk" hreflang="uk" data-title="Шпигунство" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-ur mw-list-item"><a href="https://ur.wikipedia.org/wiki/%D8%AC%D8%A7%D8%B3%D9%88%D8%B3%DB%8C" title="جاسوسی – Urdu" lang="ur" hreflang="ur" data-title="جاسوسی" data-language-autonym="اردو" data-language-local-name="Urdu" class="interlanguage-link-target"><span>اردو</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/Gi%C3%A1n_%C4%91i%E1%BB%87p" title="Gián điệp – Vietnamese" lang="vi" hreflang="vi" data-title="Gián điệp" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-war mw-list-item"><a href="https://war.wikipedia.org/wiki/Pangingispiya" title="Pangingispiya – Waray" lang="war" hreflang="war" data-title="Pangingispiya" data-language-autonym="Winaray" data-language-local-name="Waray" class="interlanguage-link-target"><span>Winaray</span></a></li><li class="interlanguage-link interwiki-wuu mw-list-item"><a href="https://wuu.wikipedia.org/wiki/%E9%97%B4%E8%B0%8D" title="间谍 – Wu" lang="wuu" hreflang="wuu" data-title="间谍" data-language-autonym="吴语" data-language-local-name="Wu" class="interlanguage-link-target"><span>吴语</span></a></li><li class="interlanguage-link interwiki-yi mw-list-item"><a href="https://yi.wikipedia.org/wiki/%D7%A9%D7%A4%D7%99%D7%90%D7%A0%D7%90%D7%96%D7%A9" title="שפיאנאזש – Yiddish" lang="yi" hreflang="yi" data-title="שפיאנאזש" data-language-autonym="ייִדיש" data-language-local-name="Yiddish" class="interlanguage-link-target"><span>ייִדיש</span></a></li><li class="interlanguage-link interwiki-zh-yue mw-list-item"><a href="https://zh-yue.wikipedia.org/wiki/%E9%96%93%E8%AB%9C" title="間諜 – Cantonese" lang="yue" hreflang="yue" data-title="間諜" data-language-autonym="粵語" data-language-local-name="Cantonese" class="interlanguage-link-target"><span>粵語</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E9%97%B4%E8%B0%8D" title="间谍 – Chinese" lang="zh" hreflang="zh" data-title="间谍" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li></ul> </section> </div> <div class="minerva-footer-logo"> <img src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" alt="Wikipedia" width="120" height="18" style="width: 7.5em; height: 1.125em;"/> <ul id="footer-icons" class="footer-icons"> <li id="footer-copyrightico"><a href="https://www.wikimedia.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><picture><source media="(min-width: 500px)" srcset="/static/images/footer/wikimedia-button.svg" width="84" height="29"><img src="/static/images/footer/wikimedia.svg" width="25" height="25" alt="Wikimedia Foundation" lang="en" loading="lazy"></picture></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><picture><source media="(min-width: 500px)" srcset="/w/resources/assets/poweredby_mediawiki.svg" width="88" height="31"><img src="/w/resources/assets/mediawiki_compact.svg" alt="Powered by MediaWiki" lang="en" width="25" height="25" loading="lazy"></picture></a></li> </ul> </div> <ul id="footer-info" class="footer-info hlist hlist-separated"> <li id="footer-info-lastmod"> This page was last edited on 13 March 2025, at 11:34<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Content is available under <a class="external" rel="nofollow" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en">CC BY-SA 4.0</a> unless otherwise noted.</li> </ul> <ul id="footer-places" class="footer-places hlist hlist-separated"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-terms-use"><a href="https://foundation.m.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use">Terms of Use</a></li> <li id="footer-places-desktop-toggle"><a id="mw-mf-display-toggle" href="//en.wikipedia.org/w/index.php?title=Espionage&amp;mobileaction=toggle_view_desktop" data-event-name="switch_to_desktop">Desktop</a></li> </ul> </div> </footer> </div> </div> <div class="mw-portlet mw-portlet-dock-bottom emptyPortlet" id="p-dock-bottom"> <ul> </ul> </div> <div class="mw-notification-area" data-mw="interface"></div> <!-- v:8.3.1 --> <script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-5c6f46dcf-8sgpn","wgBackendResponseTime":368,"wgPageParseReport":{"limitreport":{"cputime":"1.126","walltime":"1.330","ppvisitednodes":{"value":7825,"limit":1000000},"postexpandincludesize":{"value":271588,"limit":2097152},"templateargumentsize":{"value":13029,"limit":2097152},"expansiondepth":{"value":15,"limit":100},"expensivefunctioncount":{"value":24,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":265327,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1069.165 1 -total"," 25.83% 276.161 1 Template:Reflist"," 23.98% 256.417 8 Template:Navbox"," 19.87% 212.418 1 Template:Types_of_crime"," 17.83% 190.586 8 Template:Excerpt"," 12.79% 136.800 25 Template:Cite_web"," 7.65% 81.822 1 Template:Intelligence"," 7.39% 78.981 1 Template:Sidebar"," 6.77% 72.392 1 Template:Short_description"," 5.53% 59.155 3 Template:Sister_project"]},"scribunto":{"limitreport-timeusage":{"value":"0.683","limit":"10.000"},"limitreport-memusage":{"value":8022495,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-5c6f46dcf-k799j","timestamp":"20250330081441","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Espionage","url":"https:\/\/en.wikipedia.org\/wiki\/Espionage","sameAs":"http:\/\/www.wikidata.org\/entity\/Q165950","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q165950","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2002-01-19T19:35:21Z","dateModified":"2025-03-13T11:34:25Z","headline":"clandestine acquisition of confidential information"}</script><script>(window.NORLQ=window.NORLQ||[]).push(function(){var ns,i,p,img;ns=document.getElementsByTagName('noscript');for(i=0;i<ns.length;i++){p=ns[i].nextSibling;if(p&&p.className&&p.className.indexOf('lazy-image-placeholder')>-1){img=document.createElement('img');img.setAttribute('src',p.getAttribute('data-mw-src'));img.setAttribute('width',p.getAttribute('data-width'));img.setAttribute('height',p.getAttribute('data-height'));img.setAttribute('alt',p.getAttribute('data-alt'));p.parentNode.replaceChild(img,p);}}});</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10