Miss SinghThe Paradox of Fiction and the Ironies of Economic EspionageThe United States has been a target of economic espionage from several countries, including those considered as allies or friends. The FBI…May 18, 2021May 18, 2021
Miss SinghCase Study: The United States Vs Charles LieberThis case study presents the United States ongoing institutional campaign to respond to the perceived threat of China’s pursuit of its…Apr 13, 2021Apr 13, 2021
Miss SinghWhy should the United States Government require Economic Intelligence on Myanmar?IntroductionMar 18, 2021Mar 18, 2021
Miss SinghThe South African Intelligence Services: from Apartheid to DemocracyAbstract: This paper examines key differences between South Africa’s intelligence services during the implementation of apartheid by the…Feb 21, 2021Feb 21, 2021
Miss SinghOn The Methods of Intelligence Gathering and the Execution of Power as a System of Control“Aspiration for power is the distinguishing element of all politics, and hence of international politics. International politics is of…Feb 20, 2021Feb 20, 2021
Miss SinghA Short Note on Covert Action as a Policy ToolAs Rory Cormac argues in his article ‘Disruption and Deniable Interventionism’ (2017), covert action has been an oft-used policy tool both…Nov 5, 2020Nov 5, 2020
Miss SinghBlurred Lines: State Power, Tech Giants and the Omnipresent System of SurveillanceDuring a live hearing conducted before the House Judiciary Committee on Wednesday July 29th , four of the world’s most powerful tech…Aug 15, 2020Aug 15, 2020
Miss SinghDefining Development and its Relationship with the Bretton Woods System: A Critical AnalysisThe term development refers to the self-sustained economic growth of a country or an institution, which has usually been ascertained by…Jul 5, 2020Jul 5, 2020
Miss Singh‘If there’s a 1% chance [that a threat is real], we have to treat it as a certainty in terms of…AbstractMay 12, 2020May 12, 2020
Miss SinghDid you know that in order to guard China’s cyberspace known as the Great Chinese Firewall, more…From the Soviet Pipeline Attack, considered to be the first cyberattack conducted during the early 1980’s, (challenged by experts, but…Mar 31, 2020Mar 31, 2020