Haven't found the Essay You Want?
For Only $12.90/page

Spying – Obtaining Information Clandestinely Essay

Spying is seen as the act of obtaining information clandestinely. The term applies particularly to the covert act of collecting military, industrial, and political data about one nation for the benefit of another. In truth the majority of the information collected is not that ‘secret’ but often the interpretation of the synergism is. Espionage is defined as the practice of spying or the using of spies.

Spying and espionage is a part of intelligence activity, which is also concerned with analysis of diplomatic reports, newspapers, periodicals, technical publications, commercial statistics, and radio and television broadcasts. In the last fifty years espionage activity has been greatly supplemented by technological advances, especially in the areas of radio signal interception and high-altitude photography. Surveillance with high-technology equipment on the ground or from high-altitude planes and satellites has become an important espionage technique (i.e. Cuban missile crisis). Code making and code breaking (cryptography) have become computerized and very effective.

The threat of foreign espionage is used as an excuse for internal suppression and the suspension of civil rights in many countries. Espionage is a very important part of guerrilla warfare and counterinsurgency. The defensive side of intelligence activity, i.e., preventing another nation from gaining such information, is known as counterespionage. Under international law, intelligence activities are not illegal; however, every nation has laws against espionage conducted against it.

The importance of espionage in military affairs has been recognized since the beginning of recorded history. The Egyptians had a well-developed secret service, and spying and subversion are mentioned in the ‘Iliad’ and in the ‘Bible’. The ancient Chinese treatise (c.500 B.C.) on the Art of War (see Sun Tzu) devotes much attention to deception and intelligence gathering, arguing that all war is based on deception. Whilst Sun Tzu was unknown to Niccolo Machiavelli many of his concepts found new vigour within Machiavelli’s writings. In the Middle Ages, political espionage became important. Joan of Arc was betrayed by Bishop Pierre Cauchon of Beauvais, a spy in the pay of the English, and Sir Francis Walsingham developed an efficient political spy system for Elizabeth I. (See also Francis Walsingham’s acolytes Christopher Marlowe and Francis Bacon)

With the growth of the modern national state, systematized espionage became a fundamental part of government in most countries. Joseph Fouché is credited with developing the first modern political espionage system, and Frederick II of Prussia is regarded as the founder of modern military espionage. During the American Revolution, Nathan Hale and Benedict Arnold achieved fame as spies, and there was considerable use of spies on both sides during the U.S. Civil War; though it was not until the Second World War that the USA convincingly took to espionage. (‘Pearl Harbour’ was the product of the spymasters failure to collect, analyse and then act.)

By World War I, all the great powers except the United States had elaborate civilian espionage systems and all national military establishments had intelligence units. To protect the country against foreign agents, the U.S. Congress passed the Espionage Statute of 1917. Germany and Japan established elaborate espionage nets in the years preceding World War II. In 1942 the Office of Strategic Services was founded by Gen. William J. Donovan. However, the British system was the keystone of Allied intelligence, and the fount in which USA intelligence was baptised.

Since World War II, espionage activity has enlarged considerably, much of it growing out of the cold war between the United States and the former USSR. Russia and the Soviet Union have had a long tradition of espionage ranging from the Czar’s Okhrana to the Committee for State Security (the KGB), which also acted as a secret police force. In the United States the 1947 National Security Act created the Central Intelligence Agency (CIA) to coordinate intelligence and the National Security Agency for research into codes and electronic communication. In addition to these, the United States has nine other intelligence gathering agencies to which the old adage ‘too many cooks spoil the broth’ appears to apply equally well to espionage.

Famous cold war espionage cases include Alger Hiss and Whittaker Chambers and the Rosenberg Case. In 1952 the Communist Chinese captured two CIA agents, and in 1960 Francis Gary Powers, flying a U-2 reconnaissance mission over the Soviet Union for the CIA, was shot down and captured. During the cold war, many Soviet intelligence officials defected to the West, including Gen. Walter Krivitsky, Victor Kravchenko, Vladimir Petrov, Peter Deriabin Pawel Monat, and Oleg Penkovsky, of the GRU (Soviet military intelligence). Among Western officials who defected to the Soviet Union are Guy F. Burgess and Donald D. Maclean of Great Britain in 1951, Otto John of West Germany in 1954, William H. Martin and Bernon F. Mitchell, U.S. cryptographers, in 1960, and Harold (Kim) Philby of Great Britain in 1962. U.S. acknowledgment of its U-2 flights and the exchange of Francis Gary Powers for Rudolf Abel in 1962 implied the legitimacy of some espionage as an arm of foreign policy.

China has a very cost-effective intelligence program that is especially effective in monitoring neighbouring countries. Smaller countries can also mount effective and focused espionage efforts. The Vietnamese Communists, for example, had consistently superior intelligence during the Vietnam War. Israel, size for size probably has the most efficient espionage establishment in the world. Some of the Muslim countries, especially Libya, Iran, and Syria, have highly developed operations as well. Iran’s Savak was particularly feared by Iranian dissidents before the Iranian Revolution.

Essay Topics:

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email. Please, specify your valid email address

We can't stand spam as much as you do No, thanks. I prefer suffering on my own