首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Recent releases from the National Security Agency reveal details of TICOM, the mysterious 1945 operation targeting Germany's cryptologic secrets. Often mentioned by such authors as Kahn, Bamford, Parrish and Aldrich, for the first time the public has access to this information. This article provides a review in greater depth than has been previously covered in the open literature of the history of the TICOM operation, and its resulting intelligence, including the Germans' efforts against Soviet communications. In addition, some comments are provided on why TICOM has remained classified long after other similar information from World War II was declassified, and why locating TICOM documents is still difficult.  相似文献   

3.
4.
5.
6.
7.
This article challenges the erstwhile historical reliance upon the memoirs of the key protagonist of British Scientific Intelligence during the Second World War. Meticulous archival research has confirmed that the history of the genesis of British Scientific Intelligence has been distorted by the legacy and legend of R.V. Jones and his memoirs entitled Most Secret War. This article confirms that British Intelligence success in this regard was not solely the result of one man’s heroic accomplishments but, in reality, involved many individuals and organisations whose valuable exploits have been hidden in the shadows by Most Secret War.  相似文献   

8.
9.
Little is known of the history, structure and operations of the Italian intelligence services in the Mediterranean and the Middle East. The challenge brought by Fascist Italy to the security of the British and French imperial systems is at the heart of this article, which sets out to assess not only the imperial dimension of Fascist intelligence but also the response provided by Britain's and France's colonial authorities to Mussolini's ambitions in the Mediterranean and the Middle East. An examination of British and French intelligence archival material sheds new light upon perceptions of power and threat afforded by British and French policy-makers keen to maintain political control over their colonial and client states. The paper suggests that despite comprising a multitude of competing agencies, the Fascist services could rely on the work of motivated individuals and on the support of Italian diplomatic representatives overseas. Their ability to establish relations – although short-lived – with Arab nationalist leaders and their intense activities in British colonies, protectorates and mandates generated concern within the British Foreign and Colonial Offices. Meanwhile, poor intelligence coordination and assessment coupled with misguided assumptions about the nature of Arab nationalism hindered Britain's response to the challenge mounted by Mussolini's regime.  相似文献   

10.
11.
12.
13.
Suzanne Model 《Society》2008,45(6):544-548
For nearly a century, black immigrants from the West Indies have enjoyed greater economic success than African Americans. Several explanations have been proposed for this trend, but until now, none of these explanations have been subjected to systematic scrutiny. Recent efforts to adjudicate among them indicate that West Indian success can be attributed entirely to the “selectivity of migration”. This phrase refers to the tendency of people who migrate to be more talented and determined than the compatriots they leave behind. One implication of this discovery is that sympathetic observers should stop exhorting African Americans to behave more like West Indians. Such pleas are inappropriate because West Indian success is a consequence of choosing to move, not a consequence of Caribbean birth. A second implication is that persons of West Indian background remain vulnerable to racism. The new findings provide no evidence that positive selection protects West Indians from the negative stereotypes that Americans associate with black skin.
Suzanne ModelEmail:
  相似文献   

14.
This article examines the political, psychological, and moral challenges of senior public service in the executive office. The study uses memoirs published by members of the Clinton administration. The memoirs discuss the consistent background conditions of senior public service as the personality of the chief executive, the vagaries of election cycles, the tension between staff and agency executives, and the role of the media. Senior executives adopt a number of stances to address the tension between the realities of public service and the ideals they bring. The memoirs suggest several stances, such as politics as original sin, seduction, hard work and compromise, and game. The memoirs demonstrate the high cumulative cost that public service exacts on the health and personal lives of senior officials. Finally, the study reveals a number of consistent themes about how senior appointed public officials can navigate the dilemmas and challenges of senior public service at all levels of government.  相似文献   

15.
16.
17.
18.
Hoa  Nguyen Kim  Turner  Bryan S. 《Society》2010,47(3):246-253
Against the background of twentieth-century military conflict in Asia, the article concentrates on China’s contemporary relationships with outlying states, regions and provinces. Employing a version of Thomas Malthus’s political economy, we argue that population wars are an important, if often disguised, future of modern foreign relations. Through an examination of a various examples but specifically Tibet, Vietnam and Uyghurs in Xinjiang province, the article considers the current prospects of sinicization by demographic means. We conclude by describing ‘red capitalism’ in Asia as a combination of authoritarian states plus economicv success within the framework of a tributary Han civilization.  相似文献   

19.
This article addresses the problem of international law enforcement within the War on Cyberterrorism. Hybrid conflicts have replaced the traditional ones, and new threats have emerged in cyberspace, which has become a virtual battlefield. Cyber threats - cybercrimes, cyberterrorism, cyberwarfare - are a major concern for Western governments, especially for the United States and the North Atlantic Treaty Organization. The international community has begun to consider cyberattacks as a form of terrorism, to which the same measures apply. Because the term “terrorism” is ambiguous and legaly undefined, there is no consensus on a definition of the derivative term “cyberterrorism”, which is left to the unilateral interpretations of states. Pretending to consider the cyberspace domain as traditional domains, and claiming to apply IHL for the sole purpose of lawfully using armed forces in contrast to cyberterrorism is a stretch. This paper addresses the question of whether or not current laws of war and international humanitarian law apply to cyber domain, and gives some recommendations on how to tackle this issue.  相似文献   

20.

What we call the "Hollywood War Machine" analyzes the production of films within the studio system depicting the glories of US military action within theaters from around the world, spanning the Revolutionary War period to the present. A large majority of films under discussion here can be understood from the perspective of "good wars" that the film industry has strongly favored, especially during the 1990s. This essay reveals an increasing emphasis on the World War II experience as the quintessential "good war" that brings American audiences back to the undistilled benevolence of the US military through its various patriotic and heroic exploits. The undoubtedly powerful impact of the September 11, 2001 events and their aftermath upon the Hollywood War Machine is a topic worthy of further discussion.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号