Miss SinghThe Paradox of Fiction and the Ironies of Economic EspionageThe United States has been a target of economic espionage from several countries, including those considered as allies or friends. The FBI…5 min read·May 18, 2021----
Miss SinghCase Study: The United States Vs Charles LieberThis case study presents the United States ongoing institutional campaign to respond to the perceived threat of China’s pursuit of its…7 min read·Apr 13, 2021----
Miss SinghWhy should the United States Government require Economic Intelligence on Myanmar?Introduction5 min read·Mar 18, 2021----
Miss SinghThe South African Intelligence Services: from Apartheid to DemocracyAbstract: This paper examines key differences between South Africa’s intelligence services during the implementation of apartheid by the…10 min read·Feb 21, 2021----
Miss SinghOn The Methods of Intelligence Gathering and the Execution of Power as a System of Control“Aspiration for power is the distinguishing element of all politics, and hence of international politics. International politics is of…3 min read·Feb 20, 2021----
Miss SinghA Short Note on Covert Action as a Policy ToolAs Rory Cormac argues in his article ‘Disruption and Deniable Interventionism’ (2017), covert action has been an oft-used policy tool both…3 min read·Nov 5, 2020----
Miss SinghBlurred Lines: State Power, Tech Giants and the Omnipresent System of SurveillanceDuring a live hearing conducted before the House Judiciary Committee on Wednesday July 29th , four of the world’s most powerful tech…6 min read·Aug 15, 2020----
Miss SinghDefining Development and its Relationship with the Bretton Woods System: A Critical AnalysisThe term development refers to the self-sustained economic growth of a country or an institution, which has usually been ascertained by…6 min read·Jul 5, 2020----
Miss Singh‘If there’s a 1% chance [that a threat is real], we have to treat it as a certainty in terms of…Abstract12 min read·May 12, 2020----
Miss SinghDid you know that in order to guard China’s cyberspace known as the Great Chinese Firewall, more…From the Soviet Pipeline Attack, considered to be the first cyberattack conducted during the early 1980’s, (challenged by experts, but…4 min read·Mar 31, 2020----