Results 31 to 40 of about 10,273 (209)
Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack
Cyber-attacks on financial institutions and corporations are on the rise, particularly during pandemics. These attacks are becoming more sophisticated. Reports of hacking activities against government and commercial sector organisations have garnered a ...
Muhammad Usman Rana +5 more
doaj +1 more source
Arguments for exception in US security discourse [PDF]
In his influential State of Exception, Giorgio Agamben proposes that, even in apparently liberal western democracies, the state will routinely use the contingency of national emergency to suspend civil liberties and justify expansion of military and ...
Hunter, Duncan, MacDonald, Malcolm N
core +2 more sources
By applying the specialized terminology and theoretical approaches of the field of intelligence analysis, this article investigates Russian hybrid warfare in the case of Ukraine in order to offer a fuller understanding of this disputed phenomenon.
Simone Gundtoft
doaj +1 more source
Formation of “Red Scare” Concept in USA in First Half of XX Century
The issue of how the an important and multifaceted aspect of domestic and foreign policy formed by US FBI, called the "Red Scare" is addressed in the article. It is shown that this political and ideological concept seemed unacceptable for distribution in
Y. A. Levin, S. O. Buranok
doaj +1 more source
EXTENDING THE THEORETICAL STRUCTURE OF INTELLIGENCE TO COUNTERINTELLIGENCE [PDF]
This paper consolidates the author’s view on his holistic theory of counterintelligence. Based on the author’s previously published research, this paper advances a theory that used a “grounded theory” approach.
Henry Prunckun
doaj
WE KNOW YOU’RE THERE: Roman Political Counterintelligence in the Mid-Republic
This paper explores the strategies undertaken to preserve information in an age without formal services devoted to national security and counterintelligence.
Sara Margaret Perley
doaj +1 more source
International humanitarian law and the targeting of non-state intelligence personnel and objects [PDF]
This Article examines the targetability of individuals and organizations performing intelligence functions for a non-State group involved in an armed conflict.
Schmitt, Michael N.
core +1 more source
Combating Political Police: An Overview of National Action’s Counterintelligence Program, 1982–1990 [PDF]
During the mid to late 1980s the radical nationalist group National Action was targeted by domestic intelligence agencies. Known as “Operation Odessa” it was part of Australian Security Intelligence Organisation’s (ASIO) program to combat what it saw as ...
Troy Whitford
doaj
Portrait of Putin's Past [PDF]
Dubois Patrick. NARJOUX (Félix). In: , . Le dictionnaire de pédagogie et d'instruction primaire de Ferdinand Buisson : répertoire biographique des auteurs. Paris : Institut national de recherche pédagogique, 2002. p. 110. (Bibliothèque de l'Histoire de l'
Waller, J. Michael
core +2 more sources
The role of competitive intelligence in ensuring the economic security of enterprises [PDF]
The article is devoted to the issues of commercial intelligence and, related to this, the security of the enterprise. The article describes the nature, tasks, approaches to the definition of principles and the selection of effective methods of organizing
Volodymyr SIDAK +2 more
doaj

