Results 91 to 100 of about 10,273 (209)
Augmented Reality Based Interactive Cooking Guide. [PDF]
Majil I, Yang MT, Yang S.
europepmc +1 more source
This paper examines the critical role of profiling screening in countring security threats within the maritime industry, focusing on crew management and recruitment processes.In light of the industry’s susceptibility to espionage, terrorism, and ...
Anastasios-Nikolaos KANELLOPOULOS
doaj +1 more source
Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. [PDF]
Yadav A, Kumar A, Singh V.
europepmc +1 more source
Not Peace, but a Sword: Navy v. Egan and the Case Against Judicial Abdication in Foreign Affairs [PDF]
In the United States\u27 system of separation of powers, the judiciary must safeguard the rights of individuals from abuses by the political branches of government.
Rathod, Jason
core +1 more source
Reforming Intelligence: The Challenge of Control in New Democracies [PDF]
Within the realm of civilian control of the armed forces as a subset of civil-military relations, probably the most problematic issue is control of the intelligence services.
Bruneau, Thomas C. +1 more
core
DEVELOPING THEORY ON THE INSURGENT USE OF INTELLIGENCE
On November 15, 2023, Dr. David Strachan-Morris, presented on Developing Theory on the Insurgent Use of Intelligence for this year’s West Coast Security Conference.
David Strachan-Morris
doaj +1 more source
Personality Disruption as Mental Torture: The CIA, Interrogational Abuse, and the U.S. Torture Act [PDF]
This Article is a contribution to the torture debate. It argues that the abusive interrogation tactics used by the United States in what was then called the “global war on terrorism” are, unequivocally, torture under U.S. law. To some readers, this might
Luban, David, Newell, Katherine S.
core +1 more source
Fair Play: The Moral Dilemmas of Spying. By James M. Olson. The Corporate Spy: Industrial Espionage and Counterintelligence in the Multinational Enterprise with Case Studies (Abridged Version) by Edward M. Roche.
Bart Bechtel, Jeffrey Ahn
doaj
From baseworld to droneworld [PDF]
Our planet is garrisoned by a network of around 1,100 bases operated by the U.S. military. Many of these sites exist in shadow because they are used for paramilitary operations by Special Forces and the CIA.
Shaw, I.
core
Analogy of intelligence with other disciplines [PDF]
Intelligence analysis has many important epistemological resemblances with science (problem solving, discovery, skillful use of tools, knowledge verification) and is more interested in a posteriori than a priori knowledge, on how or the basis on which a ...
Sfetcu, Nicolae
core

