IniciGrupsConversesMésTendències
Cerca al lloc
Aquest lloc utilitza galetes per a oferir els nostres serveis, millorar el desenvolupament, per a anàlisis i (si no has iniciat la sessió) per a publicitat. Utilitzant LibraryThing acceptes que has llegit i entès els nostres Termes de servei i política de privacitat. L'ús que facis del lloc i dels seus serveis està subjecte a aquestes polítiques i termes.

Resultats de Google Books

Clica una miniatura per anar a Google Books.

S'està carregant…

Operation Shakespeare: The True Story of an Elite International Sting

de John Shiffman

MembresRessenyesPopularitatValoració mitjanaConverses
411605,442 (3.63)Cap
Business. Politics. Nonfiction. In Operation Shakespeare, investigative journalist John Shiffman traces a high-risk undercover operation launched by an elite undercover Homeland Security unit created to stop the Iranians, Russians, Chinese, Pakistanis, and North Koreans from acquiring sophisticated American-made electronics capable of guiding missiles, jamming radar, and triggering countless weapons-from wireless IEDs to nuclear bombs. The U.S. agents must outwit not only enemy brokers but also American manufacturers and global bankers who are too willing to put profit over national security. The three-year sting climaxes when the U.S. agents lure the Iranian broker to a former Soviet republic with the promise of American-made radar, fighter-jet, and missile components, then secretly drag him back to the United States, where he is held in secret for two years. The laptop the Iranian carries into the sting provides the CIA with a virtual road map to Tehran's clandestine effort to obtain U.S. military technology.… (més)
Cap
S'està carregant…

Apunta't a LibraryThing per saber si aquest llibre et pot agradar.

No hi ha cap discussió a Converses sobre aquesta obra.

"Operation Shakespeare", by John Shiffman, tells an unsettling story of how many foreign nations conspire to illegally obtain sophisticated technology, parts, and even complete weapon systems from United States manufacturers, suppliers or users. Export controls and severe sharing restrictions on this high-tech equipment have proven to be surprisingly ineffective. This may be due, in some part, to overly complex rules and regulations and suppliers misunderstandings, but a willingness to look past the regulations for greed and profit may play the larger role. The net result of this illegal trade is that the years of research and development and millions of dollars spent to develop this technology can be lost overnight. Technology and systems designed to advance and protect American interests are being obtained by others, especially competitors and unfriendly countries, making any technological advantage disappear.

Losses can occur in any of a variety of industries, but the author goes into some detail of how this can impact the military. Homeland Security personnel became aware of Middle East buyers seeking complex military parts, which if obtained, could be used against American forces fighting in that region. They had discovered, for example, many of the Improvised Explosive Devices (IEDs) used in Iraq to cause so many American casualties were as effective as they were because of American sensors and timers illegally obtained and used in the IEDs.

Determining how these devices were obtained can be difficult, and prosecuting those involved much more difficult, especially if the culprits remain on foreign soil. Government managers often won't spend the time and trouble to prosecute cases such as these since the likelihood of success is low, and the cost is high. Instead, many prosecutors stick to the easy cases involving drug busts at the border, or easy smuggling cases which fall in their lap. The rare exception to this attitude was an operation designated Operation Shakespeare. Agents set up a sting operation to meet, befriend, and trap an active Iranian arms buyer. The Iranian broker had links with American companies, European banks, and clients in Iranian and Chinese governments, and was attempting to obtain missile guidance equipment, a variety of military hardware, radar jamming devices, etc. Eventually, the agents were successful in luring the arms broker to Georgia where he was arrested and jailed. His arrest produced a treasure trove of intelligence, allowing intelligence agents to open numerous other investigations. Unfortunately, few if any successful follow-up operations occurred, other than to warn U.S. manufacturers and suppliers of the sophisticated equipment to be more careful in following export restrictions. ( )
  rsutto22 | Jul 15, 2021 |
Sense ressenyes | afegeix-hi una ressenya
Has d'iniciar sessió per poder modificar les dades del coneixement compartit.
Si et cal més ajuda, mira la pàgina d'ajuda del coneixement compartit.
Títol normalitzat
Títol original
Títols alternatius
Data original de publicació
Gent/Personatges
Informació del coneixement compartit en anglès. Modifica-la per localitzar-la a la teva llengua.
Llocs importants
Informació del coneixement compartit en anglès. Modifica-la per localitzar-la a la teva llengua.
Esdeveniments importants
Pel·lícules relacionades
Epígraf
Informació del coneixement compartit en anglès. Modifica-la per localitzar-la a la teva llengua.
They think the war is coming. – Amir Ardebili
Our hands are full of business, let's away, Advantage feeds him fat while men delay. – Henry IV, Part I
Dedicatòria
Informació del coneixement compartit en anglès. Modifica-la per localitzar-la a la teva llengua.
To Cathy and Outkast Platoon
Primeres paraules
Citacions
Darreres paraules
Nota de desambiguació
Editor de l'editorial
Creadors de notes promocionals a la coberta
Informació del coneixement compartit en anglès. Modifica-la per localitzar-la a la teva llengua.
Llengua original
CDD/SMD canònics
LCC canònic

Referències a aquesta obra en fonts externes.

Wikipedia en anglès

Cap

Business. Politics. Nonfiction. In Operation Shakespeare, investigative journalist John Shiffman traces a high-risk undercover operation launched by an elite undercover Homeland Security unit created to stop the Iranians, Russians, Chinese, Pakistanis, and North Koreans from acquiring sophisticated American-made electronics capable of guiding missiles, jamming radar, and triggering countless weapons-from wireless IEDs to nuclear bombs. The U.S. agents must outwit not only enemy brokers but also American manufacturers and global bankers who are too willing to put profit over national security. The three-year sting climaxes when the U.S. agents lure the Iranian broker to a former Soviet republic with the promise of American-made radar, fighter-jet, and missile components, then secretly drag him back to the United States, where he is held in secret for two years. The laptop the Iranian carries into the sting provides the CIA with a virtual road map to Tehran's clandestine effort to obtain U.S. military technology.

No s'han trobat descripcions de biblioteca.

Descripció del llibre
Sumari haiku

Debats actuals

Cap

Cobertes populars

Dreceres

Valoració

Mitjana: (3.63)
0.5
1
1.5
2
2.5
3 3
3.5 1
4 3
4.5 1
5

Ets tu?

Fes-te Autor del LibraryThing.

Tantor Media

Una edició d'aquest llibre ha estat publicada per Tantor Media.

» Pàgina d'informació de l'editor

 

Quant a | Contacte | LibraryThing.com | Privadesa/Condicions | Ajuda/PMF | Blog | Botiga | APIs | TinyCat | Biblioteques llegades | Crítics Matiners | Coneixement comú | 203,188,871 llibres! | Barra superior: Sempre visible