Showing 141 - 160 results of 227 for search '"Espionage"', query time: 0.07s Refine Results
  1. 141

    The trials of Ormond Uren: A study in security and spy mania by Bailey, R

    Published 2022
    “…The episode has become a staple of writers interested in tales of espionage and questions of loyalty, with Uren’s actions routinely presented as those of a spy and traitor. …”
    Journal article
  2. 142

    Notorious: Hitchcock’s good neighbor film Notorious: Hitchcock’s good neighbor film by Arlindo Castro

    Published 2008-04-01
    “…If they happened to go to Radio City Music Hall, Notorious would reassure them that the U.S. was doing well in preventing obstinate Nazis from making an atomic bomb, though at that moment of the nuclear espionage war, former Manhattan Project insider Klaus Fuchs had actually passed on to a Soviet contact in London classified information about the Manhattan Project and American atomic plans.2 Indeed, in that transitional period between World War II and
 the Cold War, the major political villains were still Nazis, not
 Communists, as exemplified by other 1946 films like Orson Welles’ The Stranger, Charles Vidor’s Gilda, and Edward Dmytryk’s Cornered. …”
    Get full text
    Article
  3. 143

    Data National Network Development, Its Expecting Challenges and National Security Threats by ebrahim hasan beigi

    Published 2006-02-01
    “…Information robbery, Sabotage, computer system  destruction. fraud. and espionage arc part of Information technology destructive effects for human life. …”
    Get full text
    Article
  4. 144

    Rondônia e a ditadura civil-militar: integração nacional e repressão política (1970-1981) by Daniel Alves de Almeida

    Published 2023-12-01
    “…Censorships, cassations, espionage, intimidation, arrests and torture were practiced by the regime, in order to ensure the effective development of the socio-political project of the generals in the service of big financial capital. …”
    Get full text
    Article
  5. 145

    Towards an assessment platform for the prevention of insider attacks by Chan, Cherie Ling

    Published 2018
    “…Other examples of insider threats that can be committed by employees are, monetizing sensitive data, fraud, sabotage and espionage [1]. Insider threats can cause the company huge financial losses, leakage of confidential data and detrimental to the company image. …”
    Get full text
    Final Year Project (FYP)
  6. 146

    Inference or enaction? The impact of genre on the narrative processing of other minds by Carney, J, Wlodarski, R, Dunbar, R

    Published 2014
    “…Specifically, genres that deployed evolutionarily familiar scenarios (relationship stories) were rated as being higher in quality when levels of intentionality were increased; conversely, stories that lacked evolutionary familiarity (espionage stories) were rated as being lower in quality with increases in intentionality level. …”
    Journal article
  7. 147

    Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique by Ali Mohamed, Nachaat Abdelatif

    Published 2022
    “…APT causes enormous damages for data loss, espionage, sabotage, leak, or forceful pay of ransom money to the attackers. …”
    Get full text
    Thesis
  8. 148

    En quarantaine pendant la guerre froide : Norbert Wollheim et la détention sur Ellis Island by Jan Lambertz

    Published 2016-01-01
    “…This article scrutinizes the experiences of Norbert Wollheim, held as a suspected subversive on the island at the beginning of the Cold War, just a few months after a U.S. federal court sentenced Julius and Ethel Rosenberg to death for espionage. The case of Wollheim, a survivor of Auschwitz and former Jewish community leader in West Germany, reveals a punitive chapter in U.S. immigration policy following World War II, with inclusion and exclusion in a tense, perpetual partnership. …”
    Get full text
    Article
  9. 149

    Review OSINT tool for social engineering by Martina Nobili

    Published 2023-09-01
    “…Such information might be used for (industrial) espionage, to blackmail the user, or represent the starting point to perform malicious cyber attacks against the individual or, more often, against the organization they work for. …”
    Get full text
    Article
  10. 150

    RĂSPUNDEREA PENALĂ PENTRU INFRACŢIUNILE CE ATENTEAZĂ LA SECURITATEA EXTERNĂ A ŢĂRII (art.337 şi art.338 CP RM) by USM ADMIN

    Published 2011-12-01
    “…Finally, it is argued that the subject of the offence of espionage has the special quality of foreigner or stateless person. …”
    Get full text
    Article
  11. 151

    Turvallisuuspoliisista turvallisuuspalveluksi. by Mari Luukkonen

    Published 2024-03-01
    “…The usual topics that interest historians of Finnish Security Police (SUPO) are counter espionage and counter terrorism. In this article, the viewpoint is however that of organizational development and management on strategic level. …”
    Get full text
    Article
  12. 152

    A Survey on the Use of Deep Learning Techniques for UAV Jamming and Deception by Ondřej Šimon, Tomáš Götthans

    Published 2022-09-01
    “…Unmanned aerial vehicles (UAVs) can be used for a variety of illegal activities (e.g., industrial espionage, smuggling, terrorism). Given their growing popularity and availability, and advances in communications technology, more sophisticated ways to disable these vehicles must be sought. …”
    Get full text
    Article
  13. 153

    Limits of International Legal Protection of Journalists in Armed Conflicts by M. Sh. Magomedov

    Published 2007-12-01
    “…Article 79 stipulates that journalists engaged in dangerous professional missions in areas of armed conflict (“independent” journalists) are civilians within the meaning of Article 50 (1) and thereby benefit from all the protection conferred by international humanitarian law on civilians.Article 79 (2) of Protocol I, read together with Article 51 (3), grants journalists the legal protection conferred by international humanitarian law, unless they:– accompany the armed forces and are located near it;– participate directly in the hostilities;– engage in espionage;– wear military uniform;– spread panic.The journalist loses his immunity and becomes a legitimate target in the aforesaid situations. …”
    Get full text
    Article
  14. 154

    Podejrzliwy Juliana Ursyna Niemcewicza – część pierwsza edycji (akt I–III) by Magdalena Rojewska

    Published 2019-12-01
    “…In addition to the main plot intrigue, the comedy brings a picture of extensive espionage network managed by senator Nowosilcow and his supporters. …”
    Get full text
    Article
  15. 155

    La política bajo sospecha. Regularidades y reformulaciones de la vigilancia política en Argentina: la policía de Santiago del Estero by Paulo Román Margaría, Celeste Schnyder

    Published 2015-06-01
    “…Despite the change of political regime and the recovery of the rule of law, the political and ideological espionage agencies remained within the argentine police forces. …”
    Get full text
    Article
  16. 156

    Canadian Supercomputer Threat Assessment and Potential Responses by CASIS-Vancouver

    Published 2019-05-01
    “…This briefing note is particularly relevant as Compute Canada is now preparing for 2019 resource allocation; there may be a raised/elevated security risk of economic espionage, intellectual property theft, and abusing education access privileges which needs to be considered (SFU Innovates Staff, 2018). …”
    Get full text
    Article
  17. 157

    The Spy Power, Technological Innovations, and the Human Dimensions of Intelligence: Recent Presidential Abuse of America’s Secret Agencies by Loch K. Johnson

    Published 2021-01-01
    “…Despite all the marvels of modern espionage tradecraft, the governments that rely on them must still deal with the human side of intelligence activities. …”
    Get full text
    Article
  18. 158

    Governing Chinese technologies: TikTok, foreign interference, and technological sovereignty by Ausma Bernot, Diarmuid Cooney-O'Donoghue, Monique Mann

    Published 2024-02-01
    “…TikTok bans have been presented as one solution to threats to national security, data security, foreign interference, child safety, and foreign espionage. In this article we investigate four countries/regions — Australia, the United Kingdom, the United States, and the European Union — that have banned or attempted to govern TikTok, examining the policy and legal bases for such restrictions. …”
    Get full text
    Article
  19. 159

    Podejrzliwy Juliana Ursyna Niemcewicza – cześć druga edycji (akt IV–V) by Magdalena Rojewska

    Published 2019-12-01
    “…In addition to the main plot intrigue, the comedy brings a picture of extensive espionage network managed by senator Nowosilcow and his supporters. …”
    Get full text
    Article
  20. 160

    Korean Division Films by Eunjin Choi

    Published 2022-03-01
    “…The divided Korean Peninsula, the cause of military confrontation between the two Koreas, the Korean War, and espionage activities, is the background for Korean division films. …”
    Get full text
    Article