释义 |
espionage
es·pi·o·nage E0214400 (ĕs′pē-ə-näzh′, -nĭj)n. The practice of spying or of using spies to obtain secret information, especially regarding a government or business. [French espionnage, from espionner, to spy, from Old French espion, spy, from Old Italian spione, of Germanic origin; see spek- in Indo-European roots.]espionage (ˈɛspɪəˌnɑːʒ; ˌɛspɪəˈnɑːʒ; ˈɛspɪənɪdʒ) n1. the systematic use of spies to obtain secret information, esp by governments to discover military or political secrets2. the act or practice of spying[C18: from French espionnage, from espionner to spy, from espion spy, from Old Italian spione, of Germanic origin; compare German spähen to spy]es•pi•o•nage (ˈɛs pi əˌnɑʒ, -nɪdʒ, ˌɛs pi əˈnɑʒ) n. 1. the act or practice of spying. 2. the use of spies by a government to discover the military and political secrets of other nations. 3. the use of spies by a corporation or the like to acquire the plans or technical knowledge of a competitor: industrial espionage. [1785–95; < French espionnage, Middle French espionage=espionn(er) to spy (derivative of espion spy < Italian spione] espionageThe act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense with an intent, or reason to believe, that the information may be used to the injury of the United States or to the advantage of any foreign nation. Espionage is a violation of 18 United States Code 792-798 and Article 106, Uniform Code ofMilitary Justice. See also counterintelligence.ThesaurusNoun | 1. | espionage - the systematic use of spies to get military or political secretsundercover work, spying - the act of keeping a secret watch for intelligence purposes |
espionagenoun spying, intelligence, surveillance, counter-intelligence, undercover work The authorities have arrested several people suspected of espionage.Translationsespionage (ˈespiənaːʒ) noun the activity of spying. He has never been involved in espionage. 間諜活動 间谍活动espionage
espionage (ĕs`pēənäzh'), the act of obtaining information clandestinely. The term applies particularly to the act of collecting military, industrial, and political data about one nation for the benefit of another. Industrial espionage—the theft of patents and processes from business firms—is not properly espionage at all. Modern Espionage Espionage is a part of intelligence activity, which is also concerned with analysis of diplomatic reports, newspapers, periodicals, technical publications, commercial statistics, and radio and television broadcasts. In the last fifty years espionage activity has been greatly supplemented by technological advances, especially in the areas of radio signal interception and high-altitude photography. Surveillance with high-technology equipment on the ground or from high-altitude planes and satellites has become an important espionage technique (see Cuban Missile CrisisCuban Missile Crisis, 1962, major cold war confrontation between the United States and the Soviet Union. In response to the Bay of Pigs Invasion and other American actions against Cuba as well as to President Kennedy's build-up in Italy and Turkey of U.S. ..... Click the link for more information. ). The development of the Internet has created opportunities for espionage through hacking into foreign government and private computers, through electronic surveillance of Internet and network traffic, and through the use of trojan horses, key loggers, and such computer programs. Code making and code breaking (see cryptographycryptography [Gr.,=hidden writing], science of secret writing. There are many devices by which a message can be concealed from the casual reader, e.g., invisible writing, but the term cryptography strictly applies to translating messages into cipher or code. ..... Click the link for more information. ) have become computerized and very effective. The threat of foreign espionage is used as an excuse for internal suppression and the suspension of civil rights in many countries. Espionage is a very important part of guerrilla warfareguerrilla warfare [Span.,=little war], fighting by groups of irregular troops (guerrillas) within areas occupied by the enemy. When guerrillas obey the laws of conventional warfare they are entitled, if captured, to be treated as ordinary prisoners of war; however, they are ..... Click the link for more information. and counterinsurgency. The defensive side of intelligence activity, i.e., preventing another nation from gaining such information, is known as counterespionage. Under international law, intelligence activities are not illegal; however, every nation has laws against espionage conducted against it. History Beginnings through the Nineteenth Century The importance of espionage in military affairs has been recognized since the beginning of recorded history. The Egyptians had a well-developed secret service, and spying and subversion are mentioned in the Iliad and in the Bible. The ancient Chinese treatise (c.500 B.C.) on the art of war (see Sun TzuSun Tzu , fl. c.500–320. B.C., name used by the unknown Chinese authors of the sophisticated treatise on philosophy, logistics, espionage, and strategy and tactics known as The Art of War. It includes many commentaries by later Chinese philosophers. ..... Click the link for more information. ) devotes much attention to deception and intelligence gathering, arguing that all war is based on deception. In the Middle Ages, political espionage became important. Joan of ArcJoan of Arc, Fr. Jeanne D'Arc (zhän därk), 1412?–31, French saint and national heroine, called the Maid of Orléans; daughter of a farmer of Domrémy on the border of Champagne and Lorraine. ..... Click the link for more information. was betrayed by Bishop Pierre Cauchon of Beauvais, a spy in the pay of the English, and Sir Francis Walsingham developed an efficient political spy system for Elizabeth IElizabeth I, 1533–1603, queen of England (1558–1603). Early Life
The daughter of Henry VIII and Anne Boleyn, she was declared illegitimate just before the execution of her mother in 1536, but in 1544 Parliament reestablished her in the succession after ..... Click the link for more information. . With the growth of the modern national state, systematized espionage became a fundamental part of government in most countries. Joseph FouchéFouché, Joseph , b. 1759 or 1763, d. 1820, French revolutionary and minister of police. A teacher in the schools of the Oratorian order, he joined the French Revolution and was elected to the Convention (1792). ..... Click the link for more information. is credited with developing the first modern political espionage system, and Frederick II of Prussia is regarded as the founder of modern military espionage. During the American Revolution, Nathan HaleHale, Nathan, 1755–76, American soldier, hero of the American Revolution, b. Coventry, Conn. A young schoolteacher when the Revolution broke out, he was commissioned an officer in the Connecticut militia, served in the siege of Boston, then went to take part in operations ..... Click the link for more information. and Benedict ArnoldArnold, Benedict, 1741–1801, American Revolutionary general and traitor, b. Norwich, Conn. As a youth he served for a time in the colonial militia in the French and Indian Wars. He later became a prosperous merchant. ..... Click the link for more information. achieved fame as spies, and there was considerable use of spies on both sides during the U.S. Civil War. In the Twentieth Century By World War I, all the great powers except the United States had elaborate civilian espionage systems and all national military establishments had intelligence units. To protect the country against foreign agents, the U.S. Congress passed the Espionage Statute of 1917. Mata HariMata Hari , 1876–1917, Dutch dancer and spy in German service during World War I. Her real name was Margaretha Geertruida Zelle. A dancer in Paris, she joined the German secret service in 1907, and during the war she betrayed important military secrets confided to her by ..... Click the link for more information. , who obtained information for Germany by seducing French officials, was the most noted espionage agent of World War I. Germany and Japan established elaborate espionage nets in the years preceding World War II. In 1942 the Office of Strategic Services was founded by Gen. William J. DonovanDonovan, William Joseph , 1883–1959, U.S. lawyer and government official, b. Buffalo, N.Y., grad. Columbia law school. Distinguished service in World War I won him medals and the nickname Wild Bill Donovan. ..... Click the link for more information. . However, the British system was the keystone of Allied intelligence. Since World War II, espionage activity has enlarged considerably, much of it growing out of the cold warcold war, term used to describe the shifting struggle for power and prestige between the Western powers and the Communist bloc from the end of World War II until 1989. Of worldwide proportions, the conflict was tacit in the ideological differences between communism and ..... Click the link for more information. between the United States and the former USSR. Russia and the Soviet Union have had a long tradition of espionage ranging from the Czar's Okhrana to the Committee for State Security (the KGB), which also acted as a secret policesecret police, policing organization operating in secrecy for the political purposes of its government, often with terroristic procedures. The Nature of a Secret Police ..... Click the link for more information. force. In the United States the 1947 National Security Act created the Central Intelligence AgencyCentral Intelligence Agency (CIA), independent executive bureau of the U.S. government established by the National Security Act of 1947, replacing the wartime Office of Strategic Services (1942–45), the first U.S. espionage and covert operations agency. ..... Click the link for more information. (CIA) to coordinate intelligence and the National Security AgencyNational Security Agency (NSA), an independent agency within the U.S. Dept. of Defense. Founded by presidential order in 1952, its primary functions are to collect and analyze communications intelligence information and data and to protect the security of U.S. ..... Click the link for more information. for research into codes and electronic communication. In addition to these, the United States has 13 other intelligence gathering agencies; most of the U.S. expenditures for intelligence gathering are budgeted to various Defense Dept. agencies and their programs. Under the intelligence reorganization of 2004, the director of national intelligence is responsible for overseeing and coordinating the activities and budgets of the U.S. intelligence agencies. Famous cold war espionage cases include Alger HissHiss, Alger , 1904–96, American public official, b. Baltimore. After serving (1929–30) as secretary to Justice Oliver Wendell Holmes, Hiss practiced law in Boston and New York City. ..... Click the link for more information. and Whittaker ChambersChambers, Whittaker, 1901–61, U.S. journalist and spy, b. Philadelphia. He joined the U.S. Communist party in 1925 and wrote for its newspaper before engaging (1935–38) in espionage for the USSR. He left the party in 1939 and began working for Time magazine. ..... Click the link for more information. and the Rosenberg CaseRosenberg Case, in U.S. history, a lengthy and controversial espionage case. In 1950, the Federal Bureau of Investigation arrested Julius Rosenberg (1918–53), an electrical engineer who had worked (1940–45) for the U.S. ..... Click the link for more information. . In 1952 the Communist Chinese captured two CIA agents, and in 1960 Francis Gary Powers, flying a U-2 reconnaissance mission over the Soviet Union for the CIA, was shot down and captured. During the cold war, many Soviet intelligence officials defected to the West, including Gen. Walter Krivitsky, Victor Kravchenko, Vladimir Petrov, Peter Deriabin Pawel Monat, and Oleg Penkovsky, of the GRU (Soviet military intelligence). Among Western officials who defected to the Soviet Union are Guy F. Burgess and Donald D. Maclean of Great Britain in 1951, Otto John of West Germany in 1954, William H. Martin and Bernon F. Mitchell, U.S. cryptographers, in 1960, and Harold (Kim) PhilbyPhilby, Kim (Harold Adrian Russell Philby), 1912–88, British double agent, son of Harry St. John Bridger Philby, studied Trinity College, Cambridge. A longtime high-ranking member of Britain's MI6 intelligence agency, his positions included head of the anti-Soviet section ..... Click the link for more information. of Great Britain in 1962. U.S. acknowledgment of its U-2 flights and the exchange of Francis Gary Powers for Rudolf Abel in 1962 implied the legitimacy of some espionage as an arm of foreign policy. China has a very cost-effective intelligence program that is especially effective in monitoring neighboring countries. Smaller countries can also mount effective and focused espionage efforts. The Vietnamese Communists, for example, had consistently superior intelligence during the Vietnam WarVietnam War, conflict in Southeast Asia, primarily fought in South Vietnam between government forces aided by the United States and guerrilla forces aided by North Vietnam. The war began soon after the Geneva Conference provisionally divided (1954) Vietnam at 17° N lat. ..... Click the link for more information. . Israel probably has the best espionage establishment in the world. Some of the Muslim countries, especially Libya, Iran, and Syria, have highly developed operations as well. Iran's Savak was particularly feared by Iranian dissidents before the Iranian Revolution. Bibliography See A. Ind, A Short History of Espionage (1963); R. W. Rowan and R. G. Deindorfer, Secret Service: Thirty-Three Centuries of Espionage (rev. ed. 1967); R. Friedman, Advanced Technology Warfare (1985); G. Treverton, Covert Action (1989); J. Keegan, Intelligence in War (2003); M. J. Sulick, Spying in America (2012); J. Haslam, Near and Distant Neighbors (2015). Espionage a crime involving the secret gathering or stealing of information (including economic information) that constitutes state secrets with the intent of turning the information over to another state to the detriment of the state from which the information was taken. Espionage is treated as a crime by the legal systems of all countries. It is one type of subversive activity used by imperialist intelligence services against the USSR and other countries of the socialist camp. Under Soviet criminal law, espionage is defined as an especially dangerous state crime involving the transmission, or the stealing or gathering with the intent to transmit, of military or state secrets to a foreign state or organization or to agents thereof. It may also include the transmission of other information to be used against the interests of the USSR or the collection of such information on commission from a foreign intelligence agency. Espionage is considered to have been committed from the moment that the information is obtained, regardless of whether or not it has been transmitted. An unsuccessful attempt to obtain espionage information—for example, an attempt to buy a state secret from a person who legally possesses it—constitutes attempted espionage. If classified state or military information has been obtained and transmitted, the actions of the guilty person are defined as espionage, whether he acted on his own initiative or on commission from a foreign state or organization or from agents thereof. Obtaining and transmitting other information is defined as espionage if these actions are performed on commission from foreign intelligence bodies and if the information is obtained or transmitted for use against the interests of the USSR. Espionage committed by a citizen of the USSR is treason against the homeland. It carries a sentence of ten to 15 years’ deprivation of freedom with confiscation of property, with or without additional exile for a term of two to five years, or execution with confiscation of property (art. 64 of the Criminal Code of the RSFSR and the corresponding articles of the criminal codes of the other Union republics). Espionage committed by a foreigner or person without citizenship is punishable by deprivation of freedom for seven to 15 years with confiscation of property, with or without additional exile for a term of two to five years, or by execution with confiscation of property (art. 65 of the Criminal Code of the RSFSR and the corresponding articles of the criminal codes of the other Union republics). Espionage is used extensively by the bourgeois states. The USA, for example, has a special intelligence agency known as the Central Intelligence Agency. Intelligence divisions within other departments and ministries also perform espionage and intelligence-gathering activities. At the same time, every capitalist state maintains extremely harsh punishments for espionage committed against it. In accordance with the criminal code of France, espionage is punished by execution. The penalty under British law is execution or hard labor. Liability for military espionage—that is, secretly and under false pretenses collecting information about the enemy in a zone of military action for the purpose of transmitting the information to one’s own command—is regulated by international law under the Statute on the Laws and Customs of Land Warfare, which is appended to the Hague Convention of 1907. A state that has arrested a spy has the right to punish him according to the state’s discretion, after a legal trial. Espionage Related to Espionage: Corporate espionage, Espionage ActEspionageThe act of securing information of a military or political nature that a competing nation holds secret. It can involve the analysis of diplomatic reports, publications, statistics, and broadcasts, as well as spying, a clandestine activity carried out by an individual or individuals working under secret identity to gather classified information on behalf of another entity or nation. In the United States, the organization that heads most activities dedicated to espionage is the Central Intelligence Agency (CIA). Espionage, commonly known as spying, is the practice of secretly gathering information about a foreign government or a competing industry, with the purpose of placing one's own government or corporation at some strategic or financial advantage. Federal law prohibits espionage when it jeopardizes the national defense or benefits a foreign nation (18 U.S.C.A. § 793). Criminal espionage involves betraying U.S. government secrets to other nations. Despite its illegal status, espionage is commonplace. Through much of the twentieth century, international agreements implicitly accepted espionage as a natural political activity. This gathering of intelligence benefited competing nations that wished to stay one step ahead of each other. The general public never hears of espionage activities that are carried out correctly. However, espionage blunders can receive national attention, jeopardizing the security of the nation and the lives of individuals. Espionage is unlikely to disappear. Since the late nineteenth century, nations have allowed each other to station so-called military attachés in their overseas embassies. These "attachés" collect intelligence secrets about the armed forces of their host country. Attachés have worked toward the subversion of governments, the destabilization of economies, and the assassination of declared enemies. Many of these activities remain secret in order to protect national interests and reputations. The centerpiece of U.S. espionage is the CIA, created by the National Security Act of 1947 (50 U.S.C.A. § 402 et seq.) to conduct covert activity. The CIA protects national security interests by spying on foreign governments. The CIA also attempts to recruit foreign agents to work on behalf of U.S. interests. Other nations do the same, seeking to recruit CIA agents or others who will betray sensitive information. Sometimes a foreign power is successful in procuring U.S. government secrets. One of the most damaging instances of criminal espionage in U.S. history was uncovered in the late 1980s with the exposure of the Walker spy ring, which operated from 1967 to 1985. John A. Walker Jr. and his son, Michael L. Walker, brother, Arthur J. Walker, and friend, Jerry A. Whitworth, supplied the Soviets with confidential U.S. data including codes from the U.S. Navy that allowed the Soviets to decipher over a million Navy messages. The Walker ring also sold the Soviets classified material concerning Yuri Andropov, secretary general of the Communist party until 1984; the Soviet shooting of a Korean Airlines jet in 1983; and U.S. offensives during the Vietnam War. John Walker pleaded guilty to three counts of espionage. He claimed that he had become an undercover informant for the thrill of it, rather than for the money. He was sentenced to a life term in federal prison, with eligibility for Parole in ten years. Michael Walker pleaded guilty to aiding in the supply of classified documents to the Soviets. He was able to reach a plea bargain under which he was sentenced to twenty-five years in prison. Arthur Walker was convicted of espionage in Norfolk, Virginia. His conviction was affirmed in United States v. Walker, 796 F.2d 43 (4th Cir. 1986). Like John Walker, he was sentenced to a life term in federal prison. Jerry Whitworth received a sentence of 365 years for stealing and selling Navy coding secrets (upheld in United States v. Whitworth, 856 F.2d 1268 [9th Cir. 1988]). The ring's ample opportunity to exploit the lax security of the Navy left a legacy of damage. The armed forces frantically scrapped and rebuilt their entire communications system, at a cost to taxpayers of nearly $1 billion. The U.S. department of defense (DOD) had to withdraw security clearances from approximately 2 million military and civilian personnel worldwide. The DOD also reduced the number of classified documents in order to limit the number of remaining security clearances. These reforms only addressed the tip of larger, underlying problems. The exploits of Aldrich Hazen Ames brought security problems within the CIA to the fore. As a double agent, Ames sold secrets to Moscow from 1985 to the end of the Cold War and beyond. As a CIA agent and later a CIA official, Ames was responsible for, among other things, recruiting Soviet officials to do undercover work for the United States. His position put him in contact with Soviet officials at their embassy in Washington, D.C. While in the embassy, he discussed secret matters related to U.S. intelligence. The CIA's lack of security measures, which usually consisted of no more than the collection of questionable lie detector data, gave Ames the opportunity to illegally acquire a fortune. In 1986, the CIA suspected the presence of a mole (a double agent with the objective of rising to a key position) in the system. Investigators could not be certain of the mole's identity but determined that something in their operations had gone awry. Two officers at the Soviet Embassy who had been recruited as double agents by the Federal Bureau of Investigation (FBI) had been recalled to Moscow, arrested, tried, and executed. Years later, a major blunder on Ames's part led the CIA to suspect him of leaking information that may have contributed to the death of the agents. Ames had told his superiors in October 1992 that he was going to visit his mother-in-law in Colombia. He actually went to Venezuela, where he met a Soviet contact. His travels were under surveillance, and the CIA took note of the discrepancy. By May 1993, Ames had become the focus of a criminal investigation dubbed Nightmover. Investigators found that Ames's continued activity with the Soviets had led to the execution of at least ten more agents. Ames's continuing financial struggle necessitated that he continue to sell secrets. While criminal espionage brought him more than $2.5 million from the Kremlin, Ames's carelessness with the money led to his demise. According to court documents, Ames and his wife spent nearly $1.4 million from April 1985 to November 1993. Ames's annual CIA salary never exceeded $70,000. When Ames pleaded guilty on April 28, 1994, to a two-count criminal indictment for espionage and Tax Evasion, government prosecutors sought to negotiate the plea to avoid a long trial. A trial, they feared, could force intelligence agencies to disclose secrets about the Ames case, which had already embarrassed the CIA. Escaping the ordeal of a drawn-out trial, Ames was sentenced to life in prison. As a result of the Ames case, the CIA made a number of changes, including requiring CIA employees to make annual financial disclosures and tightening the requirements for top security clearance. Several espionage cases since the 1980s have caused the United States additional embarrassment. In 1985, Jonathan Pollard, an American Jew, was arrested for spying for Israel. Pollard served as an intelligence-research specialist for the Navy's Field Operational Intelligence Office during the 1980s. He provided Israel with about 360 cubic feet of documentation in exchange for about $50,000 in cash. He was eventually arrested by U.S. officials, and, in 1987, pleaded guilty to spying on the United States. Pollard claimed that his actions were acceptable because Israel was an ally and because the Israeli agent with whom he exchanged documents already received sensitive information from the United States. Nevertheless, Pollard received a life sentence. Pollard in 1995 was granted Israeli citizenship while he continued to serve in a U.S. prison. In 1998, then President William Jefferson Clinton committed a potential blunder when he agreed upon the request of Israeli Prime Minister Benjamin Netanyahu to review Pollard's case. The promise sparked a heated debate in the United States among analysts. Clinton was able to avoid the issue when Netanyahu was replaced as prime minister in 1999. Another incident in late 1999 also caused embarrassment to the Clinton administration. In December of that year, 60 year-old Wen Ho Lee was arrested and charged with mishandling classified nuclear secrets at Los Alamos National Laboratory in New Mexico. The charge followed months of controversial investigations by the FBI and the u.s. justice department into what some government officials believed was a spy operation supported by China. Considered a security risk, Lee was placed, by the government, in guarded solitary confinement for nine months in a Santa Fe, New Mexico, county jail cell with no opportunity to raise the $1 million bail. Lee was held on 59 counts of illegally copying design secrets as well as destroying seven tapes, to which his plea was not guilty. The government then offered Lee a plea bargain if he pleaded guilty to one count of downloading classified data to a non-secure computer. Lee finally agreed to plead guilty to this minor felony charge. As part of the plea bargain, Lee was also required to provide detailed information as to what happened to the tapes. The Justice Department soon came under fire for its treatment of Lee. U.S. District Judge James A. Parker, the presiding federal judge in New Mexico who had been assigned the case, questioned why the government had chosen not to pursue a voluntary Polygraph test or allow Lee to make statements about why he had downloaded such sensitive material onto an unsecured computer or destroyed certain tapes. Even President Clinton, who had appointed then-Attorney General Janet Reno, disagreed with her about Lee being denied bail for so long. Both Clinton and Parker agreed that if these things were provided, the previous nine months would have been much less taxing for Lee. The FBI endured yet another humiliating incident in 2001 with the arrest of a high-ranking counterintelligence officer for the bureau, Robert Hanssen. Hanssen received hundreds of thousands of dollars in cash and diamonds from Russia in exchange for U.S. secrets. U.S. officials indicated that Hanssen's spying reached a peak during the 1980s, and his actions caused the deaths of at least three American spies overseas. According to the federal prosecutor in the case, Hanssen used the United States' "most critical secrets" as "personal merchandise." A U.S. district judge in 2002 sentenced Hanssen to life in prison. Further readings Adams, James. 1994. The New Spies. London: Hutchinson. Doyle, David W. 2001. True Men and Traitors: From the OSS to the CIA, My Life in the Shadows. New York: John Wiley & Sons. Gerolymatos, Andre. 1986. Espionage and Treason. Amsterdam: Gieben. Hartman, John D. 1993. Legal Guidelines for Covert Surveillance Operations in the Private Sector. Boston: Butter-worth-Heinemann. Loundy, David J. 2003. Computer Crime, Information Warfare, and Economic Espionage. Durham, N.C.: Carolina Academic Press. Udell, Gilman G. 1971. Laws Relating to Espionage, Sabotage, Etc. Washington, D.C.: U.S. Government Printing Office. U.S. House Permanent Select Committee on Intelligence. 1995. Legislative Proposals Relating to Counterintelligence: Hearing before the Permanent Select Committee on Intelligence House of Representatives. Washington, D.C.: U.S. Government Printing Office. Volkman, Ernest. 1995. Espionage. New York: Wiley. ——. 1994. Spies. New York: Wiley. Cross-references Central Intelligence Agency; Federal Bureau of Investigation; Hiss, Alger; Justice Department; Rosenbergs Trial. espionagen. the crime of spying on the Federal government and/or transferring state secrets on behalf of a foreign country. The other country need not be an "enemy," so espionage may not be treason, which involves aiding an enemy. (See: treason, sedition) espionage Related to espionage: Corporate espionage, Espionage ActSynonyms for espionagenoun spyingSynonyms- spying
- intelligence
- surveillance
- counter-intelligence
- undercover work
Words related to espionagenoun the systematic use of spies to get military or political secretsRelated Words |