-
121
Enhancement of cryptographic algorithms used in electronic communication systems
Published 2010“…Communications security was until recently, of interest mainly to bodies concerned with national security, such as the military, diplomatic and espionage services. However, with the increasing use of electronic communications in industrial and commercial activities, the subject of communication security has achieved wider importance in recent years. …”
Get full text
Thesis -
122
Repurposing <i>α</i>-Adrenoreceptor Blockers as Promising Anti-Virulence Agents in Gram-Negative Bacteria
Published 2022-01-01“…In conclusion, <i>α</i>-adrenergic blockers are proposed as promising anti-virulence agents as they hinder QS receptors and inhibit bacterial espionage.…”
Get full text
Article -
123
Lessons Learned in Intelligence Analysis
Published 2018-11-01“…The subsequent roundtable discussion focused on examining the notion of whether Canada has been excessively lenient towards individuals who have been convicted of espionage, with particular regards to the selling of classified information. …”
Get full text
Article -
124
Prizrenski proces 1956. i njegova revizija 1968. godine
Published 2022-08-01“…The aim of the paper is to shed light on the ambiguities from the trial in Prizren against nine persons suspected of espionage, as well as the final annulment of this process twelve years later. …”
Get full text
Article -
125
The cyber threat from Pyongyang
Published 2023“…Its cyber units, especially Bureau 121, are assumed to possess sophisticated cyber espionage capabilities, operating systems, and intrusion software; and the expertise to create highly destructive malware deliverable online to networked computers, or to standalone systems autonomous of the internet. …”
Get full text
Commentary -
126
Meaningless data
Published 2022-12-01“…Subsequently, using two semiotic squares, the whistleblowers’ information-delivering practice will be compared with those that define acts of espionage, trolling and fear-mongering: these positional roles of information delivery will be described on the basis of the law/crime and saying/doing semantic oppositions. …”
Get full text
Article -
127
Cyberspace in Canadian Security Policy
Published 2013-06-01“…The phenomenon of cyber terrorism, cyber espionage, or even the first examples of using cyberspace to conduct military operations has convinced decision-makers that new solutions to security challenges need to be implemented. …”
Get full text
Article -
128
Approaches to cyber weapons classification problem
Published 2013-04-01“…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
Get full text
Article -
129
US-China cyber talks : internet security in the global economy
Published 2013“…Focused on the economic implications of cyber espionage, the incipient Sino-US dialogue could define the terms of the global debate on developing cyber norms.…”
Get full text
Get full text
Commentary -
130
Decomposing value gains – the case of the best leveraged buy-out ever
Published 2022“…This story involves a high stakes leveraged buyout, layoffs, allegations of corporate espionage, the revival of an iconic brand, a $14 billion capital gain, the largest ever in private equity, and the emergence of the largest private market firm. …”
Journal article -
131
Corporate intelligence: modern view and development trends
Published 2020-07-01“…And even managed to acquire stereotypes: some consider corporate intelligence analogous to industrial espionage, others imagine it as a game of office workers in « James Bond», and the rest do not understand why it is needed in the enterprise.Corporate intelligence specialists analyze available information and check all market sources in order to make an assessment of all possible threats and risks to the business.…”
Get full text
Article -
132
A rota dos estudos sobre a cochonilha em Portugal e no Brasil no século XIX: caminhos desencontrados The route of the studies of cochineal in Portugal and Brazil in the nineteenth...
Published 2007-08-01“…This period witnessed, accordingly, several initiatives aimed at producing the precious dye: publication of specialized texts, cultivation of the cactus and the insect from which the dye is extracted, and, also, attempts to obtain the secrets of production through espionage. The present paper analyses certain aspects of the measures adopted by the Portuguese government towards Brazil in this field. …”
Get full text
Article -
133
Exploring the use of online social networking among employees in Malaysian organizations: looking potential threats to information security
Published 2013“…The western literature often report incidents of OSN causing malware attacks on corporate networks, leakage of confidential information, identity theft, cyber espionage and sabotage. Thus, this study investigates the use of OSN sites among employees of Malaysia organization including academic and non-academic staff of IIUM…”
Get full text
Monograph -
134
Canadian Immigration Policy and the Russo-Ukraine War
Published 2022-08-01“…As well, refugees tend to be targets of espionage themselves and can be a valuable source of intelligence. …”
Get full text
Article -
135
The morality of unconventional force
Published 2016“…I then apply this view to espionage and other forms of unconventional force, outlining the tricky policy implications of my thesis.…”
Book section -
136
Lessons Learned from Chinese Intelligence Officer Arrest
Published 2018-11-01“…The following events are: 1) A press release (Oct 10, 2018) announcing Chinese Ministry of State Security (MSS) operative, Yanjun Xu, aka Qu Hui, aka Zhang Hui, has been arrested and charged with conspiring and attempting to commit economic espionage and steal trade secrets from multiple U.S. aviation and aerospace companies (Department of Justice, 2018). 2) A press release (Sept 25, 2018) announcing that the FBI arrested a Chinese national named Ji Chaoqun in Chicago working as an unregistered agent of China’s civilian intelligence agency targeting American defence contractors. …”
Get full text
Article -
137
Seen in Its True Light: Desertion as a Pure Political Crime
Published 2014-11-01“…Furthermore, the article posits and discusses why desertion should constitute a pure political crime much like treason, sedition, or espionage. Lastly, the article argues, pursuant to United Nations policies, that such deserters should be able to obtain refugee status only where their desertion constitutes a refusal to be associated with military actions that are internationally condemned as contrary to the basic rules of human conduct.…”
Get full text
Article -
138
La metropoli dell’agente ich=Spaik: Libidissi di Georg Klein
Published 2014-05-01“…Combining the analysis of the role of the German spy ich=Spaik, the main figure of Klein’s novel, with a mapping of the geographies of the city Libidissi, I will point out to what extent the author poses a challenge to the tradition of the spy-story and in what way he considers Ich=Spaik’s activities, intending them not only as an operation of espionage, but especially as a persistent questioning of a problematic identity, of a figure, who is continuously confronting the image of his native country, his original belonging with the Other. …”
Get full text
Article -
139
Relations between the Russian Federation and the European Union as Reflected by the Spanish Press in 2021
Published 2022-06-01“…The articles focus on the following topics: expulsion of diplomats, mutual accusations in espionage and disinformation, Nord Stream II, Satellite V, A. …”
Get full text
Article -
140
Hybrid nature of modern threats for cybersecurity and information security
Published 2020-03-01“…The examination of hybrids threats - the cyber leverages to diplomacy, the practice of cyber retaliation, cyber sabotage and espionage, cyber weapons and the cyber arms race - was given. …”
Get full text
Article