Listing 1 - 10 of 56 | << page >> |
Sort by
|
Choose an application
This dissertation examines intelligence surveillance of private telecommunications and its compatibility with the international human right to privacy in Art. 17 ICCPR and in Art. 8 ECHR. These articles provide comprehensive protection against the most modern forms of surveillance including bulk interception. Several criteria apply in terms of the foreseeability of the surveillance laws. Telecommunication’s interception should be subject to authorisation and supervision by independent authorities and effective remedies should be available. Moreover, the study analyzes the extent to which the surveilling state and the state of residence violate their human rights obligations in cases of cross-border surveillance. The main question is whether the established definitions of "jurisdiction" are applicable to this extraterritorial scenario. The extraterritorial exercise of jurisdiction can also be based on effective control over specific objects relevant to human rights. According to this approach, telecommunications data are objects relevant to individual’s right to correspondence and data protection.
secret service --- spying --- telecommunications
Choose an application
Choose an application
Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.--
Choose an application
A history of Swedish interception of radio and telegraph messages during World Wars I and II providing a valuable background to Swedish military operations at this time. This should prove a valuable work for anyone interested in the intelligence systems at work during wartime.
Electronic intelligence --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures --- History
Choose an application
Spies --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Subversive activities --- Espionage --- Secret service --- History
Choose an application
"In Equipping James Bond, Andre Millard provides readers with a hundred-year history of espionage technology through the lens of Ian Fleming's James Bond character and the gadgets integrated into both his novels and films. This book takes a wide-ranging look at factual (as well as fictional) technology, starting with the beginning of military aviation spanning through the contemporary threat of computer hacking. Millard views the fictional James Bond universe--and its wide popularity throughout the twentieth century--as evidence for both popular Whiggish perceptions of technological development as well as the borderline apocalyptic fear of technology's potential threats. As technology developed in the twentieth century, Millard contends, so did the gadgets of the James Bond universe--Bond and his adversaries evolved alongside rapidly developing technology. According to Millard, Bond, Ian Fleming, and the global fandom of the James Bond novels and films were simultaneously enthusiastic about triumphant perceptions of growth and technology and fearful of their potential ramifications"--
Espionage --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies --- Technological innovations. --- Bond, James
Choose an application
The study explores "the case of national jitters" that occurred in the United States in the years 1938 to 1942 following rumours of the existence of a German Fifth Column movement. It relates how both government and citizens exaggerated what was actually a modest German effort.
Subversive activities --- Espionage --- World War, 1939-1945 --- Spies --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Secret service --- History
Choose an application
The Literary Spy provides a unique view of the intelligence world through the words of its own major figures (and those fascinated with them) from ancient times to the present. CIA speechwriter and analyst Charles E. Lathrop has compiled and annotated more than 3,000 "ations from such disparate sources as the Bible, spy novels and movies, Shakespeare's plays, declassified CIA documents, memoirs, TV talk shows, and speeches from U.S. and foreign leaders and officials. Arranged in thematic categories with opening commentary for each section, the "ations speak for themselves. Together they serve both to illuminate a world famous for its secrets and deceptions and to show the extent to which intelligence has manifested itself in literature and in life. Engaging, informative, and often irreverent, The Literary Spy is an exceedingly satisfying book-one that meets the needs of the serious researcher just as ably as those of the armchair spy in pursuit of an evening's entertainment.
Espionage --- History, Modern --- Modern history --- World history, Modern --- World history --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies
Choose an application
At the beginning of World War II, Heinz August L?ning, posing as a Jewish refugee, was sent to Cuba to spy for the Third Reich. L?ning's assignment was to collect information about the United States and its allies and report back to Abwehr, the German foreign intelligence agency. The Caribbean waters L?ning monitored were important to the Allies both for shipping and for deploying ships between the various fronts. Despite some early setbacks, L?ning provided information on naval activities to the Germans. Ultimately, however, L?ning was arrested and became the only Nazi spy executed in Lati
Spies --- Espionage, German --- World War, 1939-1945 --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Subversive activities --- Espionage --- Secret service --- German espionage --- Lüning, Heinz,
Choose an application
Spies. --- Military surveillance. --- Surveillance, Military --- Detectors --- Military intelligence --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Subversive activities --- Espionage --- Secret service
Listing 1 - 10 of 56 | << page >> |
Sort by
|