Results 31 to 40 of about 10,273 (209)

Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack

open access: yesIEEE Access, 2022
Cyber-attacks on financial institutions and corporations are on the rise, particularly during pandemics. These attacks are becoming more sophisticated. Reports of hacking activities against government and commercial sector organisations have garnered a ...
Muhammad Usman Rana   +5 more
doaj   +1 more source

Arguments for exception in US security discourse [PDF]

open access: yes, 2017
In his influential State of Exception, Giorgio Agamben proposes that, even in apparently liberal western democracies, the state will routinely use the contingency of national emergency to suspend civil liberties and justify expansion of military and ...
Hunter, Duncan, MacDonald, Malcolm N
core   +2 more sources

Kontraspionage, kultur og kontinuitet i Kreml: Et efterretningsteoretisk perspektiv på Ruslands interventioner i Ukraine

open access: yesNordisk Østforum, 2017
By applying the specialized terminology and theoretical approaches of the field of intelligence analysis, this article investigates Russian hybrid warfare in the case of Ukraine in order to offer a fuller understanding of this disputed phenomenon.
Simone Gundtoft
doaj   +1 more source

Formation of “Red Scare” Concept in USA in First Half of XX Century

open access: yesНаучный диалог, 2020
The issue of how the an important and multifaceted aspect of domestic and foreign policy formed by US FBI, called the "Red Scare" is addressed in the article. It is shown that this political and ideological concept seemed unacceptable for distribution in
Y. A. Levin, S. O. Buranok
doaj   +1 more source

EXTENDING THE THEORETICAL STRUCTURE OF INTELLIGENCE TO COUNTERINTELLIGENCE [PDF]

open access: yesSalus Journal, 2014
This paper consolidates the author’s view on his holistic theory of counterintelligence. Based on the author’s previously published research, this paper advances a theory that used a “grounded theory” approach.
Henry Prunckun
doaj  

WE KNOW YOU’RE THERE: Roman Political Counterintelligence in the Mid-Republic

open access: yesJournal of Ancient History and Archaeology, 2015
This paper explores the strategies undertaken to preserve information in an age without formal services devoted to national security and counterintelligence.
Sara Margaret Perley
doaj   +1 more source

International humanitarian law and the targeting of non-state intelligence personnel and objects [PDF]

open access: yes, 2020
This Article examines the targetability of individuals and organizations performing intelligence functions for a non-State group involved in an armed conflict.
Schmitt, Michael N.
core   +1 more source

Combating Political Police: An Overview of National Action’s Counterintelligence Program, 1982–1990 [PDF]

open access: yesSalus Journal, 2013
During the mid to late 1980s the radical nationalist group National Action was targeted by domestic intelligence agencies. Known as “Operation Odessa” it was part of Australian Security Intelligence Organisation’s (ASIO) program to combat what it saw as ...
Troy Whitford
doaj  

Portrait of Putin's Past [PDF]

open access: yes, 2000
Dubois Patrick. NARJOUX (Félix). In: , . Le dictionnaire de pédagogie et d'instruction primaire de Ferdinand Buisson : répertoire biographique des auteurs. Paris : Institut national de recherche pédagogique, 2002. p. 110. (Bibliothèque de l'Histoire de l'
Waller, J. Michael
core   +2 more sources

The role of competitive intelligence in ensuring the economic security of enterprises [PDF]

open access: yesKošická bezpečnostná revue, 2018
The article is devoted to the issues of commercial intelligence and, related to this, the security of the enterprise. The article describes the nature, tasks, approaches to the definition of principles and the selection of effective methods of organizing
Volodymyr SIDAK   +2 more
doaj  

Home - About - Disclaimer - Privacy