Filters








5 Hits in 41.9 sec

Development as a Battlefield

Irene Bono, Béatrice Hibou
2017 Revue Internationale de Politique de Développement  
the original author(s) and source are credited.  ...  This is an open access book distributed under the terms of the CC-BY-NC license at the time of publication, which permits any non-commercial use, distribution, and reproduction in any medium, provided  ...  The regime, however, has preferred to consolidate its base among the populations of the capital and the central regions and to ignore the inequalities at the heart of the conflicts that are now tearing  ... 
doi:10.4000/poldev.2301 fatcat:n2bg47qdyjctxn6wzmw3vscste

Interception: law, media, and techniques

Bernard Keenan, Alain Pottage, Conor Gearty
2018
In 2013, Edward Snowden provided journalists with copies of classified documents detailing the operations of the National Security Agency of the United States and its allies; in particular, the UK's Government  ...  Finally, the thesis addresses the function of legislation as it in turn addresses warrants and interception techniques.  ...  during the nineteenth century and the first half of the twentieth century.  ... 
doi:10.21953/lse.2zy5g8eu34il fatcat:dmtvlcv4wreyzpljfq66fx7hjq

Encompass Nixon' s Wars: Secrecy, Watergate, and the CIA Nixon's Wars: Secrecy, Watergate, and the CIA

Chris Collins, Christopher Collins
2016 unpublished
Based on this theory, the US's dominance of the North American continent by the end of the nineteenth century had given rise to new ambitions to expand US economic hegemony across the Pacific and into  ...  is charged by the National Security Council with conducting espionage and counter-espionage abroad. . .  ... 
fatcat:yodikdl7era3fmqno43aac4nye

Looking towards the future: the changing nature of intrusive surveillance and technical attacks against high-profile targets

Jonathan Gudgeon, Christopher Leslie Hankin
2022
In this thesis a novel Bayesian model is developed that is capable of predicting the probability of a range of eavesdropping techniques deployed, given an attacker's capability, opportunity and intent.  ...  This thesis makes four contributions: through the analysis of technical eavesdropping events over the last century, technological innovation is shown to have enriched the eavesdropping opportunities for  ...  Strowger Telephone Switch One of the earliest examples in the late nineteenth century of eavesdropping through technological means resulted in the invention of a key component of the automated telephone  ... 
doi:10.25560/96065 fatcat:teqj54l5h5ahppa2upzpawmnym

Bibliographie [chapter]

Agnès Maillot
L'IRA et le conflit nord-irlandais  
, and to Dr R Clutterbuck for providing some information and material used in Part A taken from his book Terrorism in an Unstable World.  ...  Acknowledgements are due to Professor B O'Neill for providing the feature of analytical research into insurgencies, to Doctor G Dyer for some aspects of the historical analysis of insurgencies post 1945  ...  the latter half of the Nineteenth Century.  ... 
doi:10.4000/books.puc.10952 fatcat:zclnnw44ufdz7gz5wvlxsuekci