-
141
The trials of Ormond Uren: A study in security and spy mania
Published 2022“…The episode has become a staple of writers interested in tales of espionage and questions of loyalty, with Uren’s actions routinely presented as those of a spy and traitor. …”
Journal article -
142
Notorious: Hitchcock’s good neighbor film Notorious: Hitchcock’s good neighbor film
Published 2008-04-01“…If they happened to go to Radio City Music Hall, Notorious would reassure them that the U.S. was doing well in preventing obstinate Nazis from making an atomic bomb, though at that moment of the nuclear espionage war, former Manhattan Project insider Klaus Fuchs had actually passed on to a Soviet contact in London classified information about the Manhattan Project and American atomic plans.2 Indeed, in that transitional period between World War II and the Cold War, the major political villains were still Nazis, not Communists, as exemplified by other 1946 films like Orson Welles’ The Stranger, Charles Vidor’s Gilda, and Edward Dmytryk’s Cornered. …”
Get full text
Article -
143
Data National Network Development, Its Expecting Challenges and National Security Threats
Published 2006-02-01“…Information robbery, Sabotage, computer system destruction. fraud. and espionage arc part of Information technology destructive effects for human life. …”
Get full text
Article -
144
Rondônia e a ditadura civil-militar: integração nacional e repressão política (1970-1981)
Published 2023-12-01“…Censorships, cassations, espionage, intimidation, arrests and torture were practiced by the regime, in order to ensure the effective development of the socio-political project of the generals in the service of big financial capital. …”
Get full text
Article -
145
Towards an assessment platform for the prevention of insider attacks
Published 2018“…Other examples of insider threats that can be committed by employees are, monetizing sensitive data, fraud, sabotage and espionage [1]. Insider threats can cause the company huge financial losses, leakage of confidential data and detrimental to the company image. …”
Get full text
Final Year Project (FYP) -
146
Inference or enaction? The impact of genre on the narrative processing of other minds
Published 2014“…Specifically, genres that deployed evolutionarily familiar scenarios (relationship stories) were rated as being higher in quality when levels of intentionality were increased; conversely, stories that lacked evolutionary familiarity (espionage stories) were rated as being lower in quality with increases in intentionality level. …”
Journal article -
147
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
Published 2022“…APT causes enormous damages for data loss, espionage, sabotage, leak, or forceful pay of ransom money to the attackers. …”
Get full text
Thesis -
148
En quarantaine pendant la guerre froide : Norbert Wollheim et la détention sur Ellis Island
Published 2016-01-01“…This article scrutinizes the experiences of Norbert Wollheim, held as a suspected subversive on the island at the beginning of the Cold War, just a few months after a U.S. federal court sentenced Julius and Ethel Rosenberg to death for espionage. The case of Wollheim, a survivor of Auschwitz and former Jewish community leader in West Germany, reveals a punitive chapter in U.S. immigration policy following World War II, with inclusion and exclusion in a tense, perpetual partnership. …”
Get full text
Article -
149
Review OSINT tool for social engineering
Published 2023-09-01“…Such information might be used for (industrial) espionage, to blackmail the user, or represent the starting point to perform malicious cyber attacks against the individual or, more often, against the organization they work for. …”
Get full text
Article -
150
RĂSPUNDEREA PENALĂ PENTRU INFRACŢIUNILE CE ATENTEAZĂ LA SECURITATEA EXTERNĂ A ŢĂRII (art.337 şi art.338 CP RM)
Published 2011-12-01“…Finally, it is argued that the subject of the offence of espionage has the special quality of foreigner or stateless person. …”
Get full text
Article -
151
Turvallisuuspoliisista turvallisuuspalveluksi.
Published 2024-03-01“…The usual topics that interest historians of Finnish Security Police (SUPO) are counter espionage and counter terrorism. In this article, the viewpoint is however that of organizational development and management on strategic level. …”
Get full text
Article -
152
A Survey on the Use of Deep Learning Techniques for UAV Jamming and Deception
Published 2022-09-01“…Unmanned aerial vehicles (UAVs) can be used for a variety of illegal activities (e.g., industrial espionage, smuggling, terrorism). Given their growing popularity and availability, and advances in communications technology, more sophisticated ways to disable these vehicles must be sought. …”
Get full text
Article -
153
Limits of International Legal Protection of Journalists in Armed Conflicts
Published 2007-12-01“…Article 79 stipulates that journalists engaged in dangerous professional missions in areas of armed conflict (“independent” journalists) are civilians within the meaning of Article 50 (1) and thereby benefit from all the protection conferred by international humanitarian law on civilians.Article 79 (2) of Protocol I, read together with Article 51 (3), grants journalists the legal protection conferred by international humanitarian law, unless they:– accompany the armed forces and are located near it;– participate directly in the hostilities;– engage in espionage;– wear military uniform;– spread panic.The journalist loses his immunity and becomes a legitimate target in the aforesaid situations. …”
Get full text
Article -
154
Podejrzliwy Juliana Ursyna Niemcewicza – część pierwsza edycji (akt I–III)
Published 2019-12-01“…In addition to the main plot intrigue, the comedy brings a picture of extensive espionage network managed by senator Nowosilcow and his supporters. …”
Get full text
Article -
155
La política bajo sospecha. Regularidades y reformulaciones de la vigilancia política en Argentina: la policía de Santiago del Estero
Published 2015-06-01“…Despite the change of political regime and the recovery of the rule of law, the political and ideological espionage agencies remained within the argentine police forces. …”
Get full text
Article -
156
Canadian Supercomputer Threat Assessment and Potential Responses
Published 2019-05-01“…This briefing note is particularly relevant as Compute Canada is now preparing for 2019 resource allocation; there may be a raised/elevated security risk of economic espionage, intellectual property theft, and abusing education access privileges which needs to be considered (SFU Innovates Staff, 2018). …”
Get full text
Article -
157
The Spy Power, Technological Innovations, and the Human Dimensions of Intelligence: Recent Presidential Abuse of America’s Secret Agencies
Published 2021-01-01“…Despite all the marvels of modern espionage tradecraft, the governments that rely on them must still deal with the human side of intelligence activities. …”
Get full text
Article -
158
Governing Chinese technologies: TikTok, foreign interference, and technological sovereignty
Published 2024-02-01“…TikTok bans have been presented as one solution to threats to national security, data security, foreign interference, child safety, and foreign espionage. In this article we investigate four countries/regions — Australia, the United Kingdom, the United States, and the European Union — that have banned or attempted to govern TikTok, examining the policy and legal bases for such restrictions. …”
Get full text
Article -
159
Podejrzliwy Juliana Ursyna Niemcewicza – cześć druga edycji (akt IV–V)
Published 2019-12-01“…In addition to the main plot intrigue, the comedy brings a picture of extensive espionage network managed by senator Nowosilcow and his supporters. …”
Get full text
Article -
160
Korean Division Films
Published 2022-03-01“…The divided Korean Peninsula, the cause of military confrontation between the two Koreas, the Korean War, and espionage activities, is the background for Korean division films. …”
Get full text
Article