• No results found

Espionage/Spies

Spies in Uniform: British Military and Naval Intelligence on the Eve of the First World War

Spies in Uniform: British Military and Naval Intelligence on the Eve of the First World War

... valued more highly than fluency in German. The attachés' dual role as representatives of their service and intelligence assets as well as officials under the auspices of the Foreign Office is acknowledged and given due ...

5

Poisoned Honey: The Myth of Women in Espionage

Poisoned Honey: The Myth of Women in Espionage

... fledgling espionage agencies that were established at the turn of the century to vanquish “enemy ...of spies that Sir Vernon Kell divided them into 15 different categories that ranged from the mysterious ...

17

The Language of Espionage: Mata Hari and the Creation of the Spy-Courtesan

The Language of Espionage: Mata Hari and the Creation of the Spy-Courtesan

... The international woman, however, could also take recognizable, even domestic forms. Central to the spy novels that had generated a fascination for intelligence work before the war, were strong male heroes who often ...

17

A Reevaluation of the Damage Done to the United States by Soviet Espionage

A Reevaluation of the Damage Done to the United States by Soviet Espionage

... Soviet espionage is found in Jerrold Schecter and Leona Schecter, Sacred Secrets: How Soviet Intelligence Operations Changed American History, (Washington, ...Soviet espionage from the viewpoint of a former ...

10

Swinging sixties spies in comic book guise! Fathom and Modesty Blaise

Swinging sixties spies in comic book guise! Fathom and Modesty Blaise

... By the mid-1960s, swinging espionage flicks and the James Bond franchise had become firmly established at the box office, perfect for the playboy pop-art era. Bond even jumped feet first into the groovy new times ...

5

Enforcing a Prohibition on International Espionage

Enforcing a Prohibition on International Espionage

... more espionage and information theft to occur remotely, which frustrates the ability of states to physically punish ...state-sponsored espionage lies with the action by a country’s ...on espionage ...

27

Secrets, Lies, and Journalist Spies: the contemporary moral dilemma for Bulgarian media professionals

Secrets, Lies, and Journalist Spies: the contemporary moral dilemma for Bulgarian media professionals

... According to Znepolski (2008), the legacy of communism in Bulgaria is very much present and unresolved more than two decades after the collapse of the regime. His claim can easily be applied to the alleged role of ...

30

Economic and industrial espionage: a different perspective on inter organizational learning

Economic and industrial espionage: a different perspective on inter organizational learning

... The theft of DNA samples itself raises real concerns regarding commercial competition between nation states. In this particular case Okamoto’s actions indicate that scientific collaboration for the good of human kind ...

31

Secrets, Lies, and Journalis- Spies: The Contemporary Moral Dilemma for Bulgarian Media Professionals

Secrets, Lies, and Journalis- Spies: The Contemporary Moral Dilemma for Bulgarian Media Professionals

... taking sides, ” acting as a mouthpiece of political parties and their ideologies. This perception can be explained by sociОtв’s well-documented fears that public figures could be subjected to blackmail by those who had ...

30

Spies in the Information Economy: Academic Publishers and the Trade in Personal Information

Spies in the Information Economy: Academic Publishers and the Trade in Personal Information

... Political criticism of surveillance has mostly been concerned with the relationship of state and citizen, and particularly where the state is felt to overstep the boundaries of normative or constitutional values, in ...

10

Walter Spies, tourist art and Balinese art in inter war colonial Bali

Walter Spies, tourist art and Balinese art in inter war colonial Bali

... Walter Spies, which are also not monographic in ...towards Spies as ...which Spies spent in Indonesia, also addresses Spies’ formative years and his early influences, firstly in Russia and ...

279

A Survey of E-Business Security For Mobile Multi-Agent Environment

A Survey of E-Business Security For Mobile Multi-Agent Environment

... 4. Protecting Agents from Attacks of Malicious Hosts: - When a host receives a mobile agent for execution, it is possible that the host spies or interferes with the agent’s execution. Let us consider the case ...

11

Rogues of the racecourse

Rogues of the racecourse

... and espionage can be found in press coverage on the racecourse wars throughout the early twenties, the reportage shaped by underlying assumptions about foreigners, violence and ...

30

Seeking the Self in Pigment and Pixels: Postmodernism, Art, and the Subject

Seeking the Self in Pigment and Pixels: Postmodernism, Art, and the Subject

... of Espionage Fiction (2008), traces the history of espionage to Sun Tzu‘s 2000 year-old assertion that ―Knowledge of the enemy‘s dispositions can only be obtained from other men‖ ...

329

The International Legal Regulation of Cyber Espionage

The International Legal Regulation of Cyber Espionage

... cyber espionage specifically, much will depend upon the facts of the case in question and in particular the extent to which the cyber espionage compromises the sovereign authority of the ...cyber ...

22

Rethinking Espionage in the Modern Era

Rethinking Espionage in the Modern Era

... cyber espionage capacities to gain relative power in the international ...cyber espionage capacities is greater than the return for investing in traditional ...cyber espionage capacity, and are ...

40

Adulterate -Bot Detection & Espionage Monitoring System

Adulterate -Bot Detection & Espionage Monitoring System

... The Espionage & Monitoring System program logs all Keystroke Logging along with the name of the application in which the keystrokes were ...Using Espionage & Monitoring System, we prevent the ...

9

Using VPN service against hacker espionage

Using VPN service against hacker espionage

... Interest in the topic of identity protection on the Internet is constantly gaining in importance, with progressive growth of digital communication and application of the Internet as an information and communication ...

5

GPU-Based Espionage & Monitoring System – An Overview

GPU-Based Espionage & Monitoring System – An Overview

... space Espionage & Monitoring System. Unlike Type III Espionage & Monitoring System, they are both background processes which register operating-system-supported hooks to surreptitiously log every ...

8

Show all 61 documents...

Related subjects