Listing 1 - 10 of 136 | << page >> |
Sort by
|
Choose an application
This dissertation examines intelligence surveillance of private telecommunications and its compatibility with the international human right to privacy in Art. 17 ICCPR and in Art. 8 ECHR. These articles provide comprehensive protection against the most modern forms of surveillance including bulk interception. Several criteria apply in terms of the foreseeability of the surveillance laws. Telecommunication’s interception should be subject to authorisation and supervision by independent authorities and effective remedies should be available. Moreover, the study analyzes the extent to which the surveilling state and the state of residence violate their human rights obligations in cases of cross-border surveillance. The main question is whether the established definitions of "jurisdiction" are applicable to this extraterritorial scenario. The extraterritorial exercise of jurisdiction can also be based on effective control over specific objects relevant to human rights. According to this approach, telecommunications data are objects relevant to individual’s right to correspondence and data protection.
secret service --- spying --- telecommunications
Choose an application
This dissertation examines intelligence surveillance of private telecommunications and its compatibility with the international human right to privacy in Art. 17 ICCPR and in Art. 8 ECHR. These articles provide comprehensive protection against the most modern forms of surveillance including bulk interception. Several criteria apply in terms of the foreseeability of the surveillance laws. Telecommunication’s interception should be subject to authorisation and supervision by independent authorities and effective remedies should be available. Moreover, the study analyzes the extent to which the surveilling state and the state of residence violate their human rights obligations in cases of cross-border surveillance. The main question is whether the established definitions of "jurisdiction" are applicable to this extraterritorial scenario. The extraterritorial exercise of jurisdiction can also be based on effective control over specific objects relevant to human rights. According to this approach, telecommunications data are objects relevant to individual’s right to correspondence and data protection.
Law --- secret service --- spying --- telecommunications
Choose an application
This dissertation examines intelligence surveillance of private telecommunications and its compatibility with the international human right to privacy in Art. 17 ICCPR and in Art. 8 ECHR. These articles provide comprehensive protection against the most modern forms of surveillance including bulk interception. Several criteria apply in terms of the foreseeability of the surveillance laws. Telecommunication’s interception should be subject to authorisation and supervision by independent authorities and effective remedies should be available. Moreover, the study analyzes the extent to which the surveilling state and the state of residence violate their human rights obligations in cases of cross-border surveillance. The main question is whether the established definitions of "jurisdiction" are applicable to this extraterritorial scenario. The extraterritorial exercise of jurisdiction can also be based on effective control over specific objects relevant to human rights. According to this approach, telecommunications data are objects relevant to individual’s right to correspondence and data protection.
Law --- secret service --- spying --- telecommunications
Choose an application
Choose an application
Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.--
Choose an application
Sorge's activities between 1930 and 1942 have tended to be lauded as those of a superlative human intelligence operator, and the Soviet Union's GRU (Soviet military intelligence unit) as the optimum of spy-masters. Although it was unusual for a great deal of inside knowledge to be obtained from the Japanese side, most attention has always been paid on the German side to the roles played by representatives of the German Army in Japan. This book, supported by extensive notes and a bibliography, by contrast, highlights the friendly relations between Sorge and Paul Wenneker, German naval attaché in Japan from 1932 to 1937 and 1940-45. Wenneker, from extensive and expanding contacts inside the Japanese Navy (and also concealed contacts with the Japanese Army) supplied Sorge with key information on the depth of rivalry between the Japanese armed services.
Spies --- World War, 1939-1945 --- Secret service --- Espionage. --- Japanese military. --- Riichard Sorge. --- axis. --- intelligence. --- spying. --- ww2. --- Sorge, Richard, --- Subversive activities --- Espionage --- Agents, Secret --- Intelligencers (Spies) --- Operatives (Spies) --- Secret agents --- Spooks (Spies) --- Spying --- Zorge, Rikhard, --- Зорге, Рихард, --- Zoruge, Rihiaruto, --- Sonter, R.
Choose an application
Espionage --- -Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- Intelligence service --- Spies --- -Espionage --- Covert operations (Espionage)
Choose an application
Espionage --- Espionnage --- Covert operations (Espionage) --- Operations, Undercover (Espionage) --- Spying --- Undercover operations (Espionage) --- 327.8.019.5 --- History
Choose an application
Choose an application
A history of Swedish interception of radio and telegraph messages during World Wars I and II providing a valuable background to Swedish military operations at this time. This should prove a valuable work for anyone interested in the intelligence systems at work during wartime.
Electronic intelligence --- Electronic spying --- ELINT (Electronic intelligence) --- Intelligence, Electronic --- Electronic surveillance --- Intelligence service --- Military intelligence --- Electronic countermeasures --- History
Listing 1 - 10 of 136 | << page >> |
Sort by
|