Quotes of All Topics . Occasions . Authors
The sort of sweeping parochial espionage and attempts to extract information from all sorts of institutions are well documented, but I think in this context there's a danger of oversimplifying and seeing that sector of cyber as a one-way street.
In most espionage novels, the characters risk their lives trying to save somebody or while protecting a nation from some threat. In 'The Travelers,' that's not what's going on. I used espionage as a device to heighten the characters' personal dramas.
'The Man Who Never Was,' by Ewen Montagu, remains the best book about wartime espionage written by an active participant - incomplete, and dry in parts, it nonetheless summons up the ingenuity and sheer eccentricity of those who played this strange and dangerous game.
In many cases, Obama's exercise of authoritarian power is criminal. His executive branch is responsible for violations of the Arms Export Control Act in shipping weapons to Syria, the Espionage Act in Libya, and IRS law with regard to the targeting of conservative groups.
When I first read Helen Weinzweig's 'Basic Black with Pearls' several years ago, I emerged in the sort of daze that happens when a book seems to ferret out your most secret thoughts and hopes. Since then, I've described the book to others as an 'interior feminist espionage novel.'
Mysteries include so many things: the noir novel, espionage novel, private eye novels, thrillers, police procedurals. But the pure detective story is where there's a detective and a criminal who's committed a murder and leaves clues for the detective and the careful reader to find.
In terms of the espionage, this is something I have talked to President Obama about. We don't want it to mar the relationship between Mexico and the United States. But it is unacceptable for a country to practice such espionage, especially if there is a good relationship with the other country.
Because there are little to no consequences for conducting cyberattacks, criminals and nation-states are becoming bolder in their threats and behavior. Russia, China, North Korea and Iran are increasingly hacking into U.S. companies and government networks for espionage purposes or financial gain.
I have covered Israeli hostage and M.I.A. cases for more than 15 years, including the covert ways in which Israel's powerful espionage agencies operate to bring soldiers home alive or dead. Over that time, the issue has come to dominate public discourse to a degree that no one could have predicted.
While cyber espionage is having a tremendous negative affect on the global economy from the theft-caused drain of intellectual property and the resulting adverse incentives for continued investments in innovative growth, the threat from destructive and disruptive attacks is amplifying the risks even further.
Broadly speaking, the problems with the Espionage Act are that it is hopelessly broad. And we tend to use the Espionage Act - we think about the Espionage Act as forbidding disclosures of classified information. That's not really what the statute says. What the statute talks about is information related to the national defense.
Our adversaries - terrorists, foreign intelligence services, and criminals - take advantage of modern technology to hide their communications; recruit followers; and plan, conduct, and encourage espionage, cyber attacks, or terrorism to disperse information on different methods to attack the U.S. homeland and to facilitate other illegal activities.