National security

Energy security (10)
Espionage (16)
Intelligence services (42)
National security (23)

Synopsis: Domenii: Security: Security generale: Political security: National security:


BBC 00145.txt

chair of the Department of National security Studies, at the US Naval War College.""At least that's my personal opinion.


BBC 00311.txt

and documents leaked by Edward Snowden, the former National security agency contractor, and published by the Washington post,


ec.europa.eu 2015 0000261.txt

Game-changing green technology like this could have a direct impact on the EU 2020 commitment to reducing energy use and greenhouse gas emissions while improving overall energy security,


ec.europa.eu 2015 000086.txt

energy security and turning possibly a greenhouse gas into a useful resource. Researchers have demonstrated for the first time successfully the entire production chain for renewable kerosene,


entrepreneur.com 2015 00007.txt

#UK and U s. Intelligence agencies to Up Cyber security Cooperation Britain and the United states will increase cooperation on cyber security Prime minister David cameron said setting up cyber cells to share intelligence

and the U s. National security agency will include joint war games with the first exercise later this year to involve the Bank of england and commercial banks in both the City of London and Wall street the BBC reported.


futurity_medicine 00437.txt

The National Science Foundation, Phd scholarships from Brazil and the US Department of defense, the Office of Naval Research, the National Geospatial-Intelligence agency, the Army Research Office,


futurity_medicine 00540.txt

The National security Science and Engineering Faculty Fellowship of Energy the Korean Foundation for International Cooperation of Science and Technology,


futurity_sci_tech 00181.txt

The Office of Naval Research the Department of defense s National security Science and Engineering Faculty Fellowship Program and the Robert A. Welch Foundation supported the research.


futurity_sci_tech 00284.txt

The new method also has the potential to enhance our national security. The researchers used the method to enrich lithium-7, crucial to the operation of most nuclear reactors.


futurity_sci_tech 00834.txt

or espionage devices from lutter (other metallic items like pipes drink cans or nails for example) that may be mistaken for a genuine target by traditional radar and metal detectors.

The antenna is typical of circuitry in devices associated with covert communications espionage or explosives.


impactlab_2013 00040.txt

Britain s#Guardian newspaper#ran a story alleging that the U s. carrier Verizon was handing over call records to the National security agency, America s signals intelligence operation.

national security isn t one of them. It also gradually became clear that many of those countries intelligence agencies were in fact#in on it##to varying degrees##with the chief culprit being the United kingdom,

whose GCHQ agency is#at least as active as the NSA #when it comes to tapping the world s communications.

Since the end of WORLD WAR II, mass communications have been subject to surveillance by a network of friendly, English-speaking intelligence agencies.

but they are colored all now by the knowledge that collected data may at some point be targeted by intelligence agencies and other authorities.


impactlab_2013 00097.txt

But the work is serious Cyber Gym s launch was attended by members of Israel s intelligence community

and an attempt at industrial espionage that originated in China. And in June, Prime minister Benjamin Netanyahu accused arch-enemy Iran of stepping up cyber attacks against Israel,


impactlab_2013 00184.txt

former#National security agency#contractor#Edward Snowden#revealed the spy agency had hacked network backbones around the world to gain access to sensitive information.


impactlab_2013 00192.txt

If all major countries decide to bolster their electronic espionage and counterespionage capabilities, that itself is going to be a lot of hardware,


impactlab_2014 00540.txt

and was supercharged by the backlash last year to revelations about National security agency surveillance. The change would end the long-running contract between the Commerce department and the Internet Corporation for Assigned Names and Numbers (ICANN), a California-based nonprofit group.


Nature 04490.txt

During a visit to Argonne National Laboratory, he will call for $2-billion energy security trust fund dedicated to research to boost automobile efficiency,

Obama had mentioned briefly the idea of an energy security trust in his State of the Union address in January,


news.discovery.com 2015 01289.txt.txt

Researchers from Tsinghua University and Tzekwan technology, a financial security protection firm, have announced the first ATM that works with facial recognition capabilities, reports the South China Morning Post.


newsoffice 00232.txt

but the National security agency isn t the only organization that collects information about people s online behavior.


phys_org 00209.txt

and national security since an electron beam is a critical component in generating X-rays. While carbon nanotube cathodes have been studied extensively in academia Fermilab is the first facility to test the technology within a full-scale setting.


popsci_2013 00091.txt

When did the shuttle program become relevant to anyone but the US Department of Espionage?


R_profit.ndtv.com_news_banking-finance 2015 00421.txt.txt

, according to data from National securities Depository Limited (NSDL. The sales helped push the Nifty down 6. 6 per cent in August, its worst monthly performance since November 2011.


R_techcrunch.com 2015 00003080.txt

but to get tangible results for the Government and French intelligence agencies. In order to campaign for this law

the Government has been saying that intelligence agencies were already spying on everyone, and this new law is a more honest for everyone.


R_www.bbc.com_news_business 2015 00152.txt.txt

the government has concerns about energy security-it wants us to generate our own power, not rely on others for it.


R_www.bbc.com_technology 2015 00479.txt.txt

#US House rejects NSA phone data trawl The US House of representatives has voted to end the National security agency's bulk collection of Americans'phone records.

and civil rights advocates, say it protects privacy while preserving national security powers. The bill which only affects people within the US,


R_www.businessinsider.com_sai 2015 00374.txt.txt

outlined to Business Insider four major ways that advancements in internet technology could threaten national security.

what experts say is a major attempt to compete with superior US military cyber capabilities. hey the Chinese have devoted previously substantial resources to cyber espionage and theft,

"In early January 2011, the NSA presented its conclusions to top national security officials: Elite Russian hackers had breached the stock exchange

The frequency of identity theft has increased dramatically, according to a report released last year by the National security agency,


R_www.cleantechnica.com 2015 02342.txt.txt

It can provide energy security, lower energy costs and eventually offer an opportunity to become part of the market for buying


R_www.cleantechnica.com 2015 04251.txt.txt

maximise socioeconomic development and enhance energy security with limited environmental impact, said Mr. Amin. he technologies are available,


R_www.dailymail.co.uk_sciencetech 2015 01595.txt.txt

Bitcoins, an online currency that is hard to trace, are becoming the preferred way hackers collect ransoms, according to FBI Special agent Thomas Grasso,


R_www.forbes.com_technology 2015 00742.txt

and installation alternative energy generation technologies to improve their energy and economic security. There is clear evidence of this already occurring in Europe and China especially.


R_www.npr.org_sections_research-news 2015 00298.txt.txt

At DEA headquarters in Washington, D c.,special agent Eduardo Chavez says he shares some of Oye's concerns about using yeast for home-brewing.


R_www.npr.org_sections_technology 2015 00751.txt.txt

At DEA headquarters in Washington, D c.,special agent Eduardo Chavez says he shares some of Oye's concerns about using yeast for home-brewing.


R_www.usatoday.com_tech_ 2015 02684.txt.txt

He argued that spying on Europeans by the National security agency, as disclosed by Snowden, meant his data privacy rights were not being protected adequately.

The judgement makes it clear that U s. businesses cannot simply aid U s. espionage efforts in violation of European fundamental rights,

the National security agency and other United states security agencies such as the Federal bureau of investigation are able to access it in the course of a mass and indiscriminate surveillance and interception of such data."


R_www.zdnet.com 2015 00001082.txt

online espionage The White house has set out plans to use economic sanctions against cyber attackers and companies that benefit from the online theft of secrets.

or groups whose cyber attacks result in significant threats to US national security or economic health. It gives authorities the power to freeze assets,

and severity of malicious cyber-enabled activities"pose an"unusual and extraordinary threat"to the national security, foreign policy,

when it comes to industrial espionage, where attacks may take place over months and years, and even harder to prove that a company has benefited from such an attack t


R_www.zdnet.com 2015 0000540.txt

developed by Yahoo and Google after the Edward Snowden US National security agency (NSA) revelations. While Google has said previously it will include encryption services by default within the Android operation system,


ScienceDaily_2014 00562.txt

'His invention can help to curb industrial espionage. A method ensuring that all telephone calls are encrypted

They new system can prove hugely effective in combating industrial espionage, says Lars Ramkilde Knudsen.

Industrial espionage poses one of the biggest cyber threats in Denmark, according the the Danish Security and Intelligence service's latest risk assessment.

Industrial espionage occurs when different players discover and steal trade secrets such as business plans from companies, technical know-how and research results,

budgets and secret plans using phone tapping, for example. In the USA alone, the phenomenon costs businesses around USD 100 billion every year according to a 2014 report on the subject by security firm Mcafee.


socialnewsdaily.com 2014 0000258.txt

Lynch was referencing special agent Dale Cooper who loved himself a amn fine cup of coffee.


techcrunch 00246.txt

increase energy security and improve the competitiveness of U k. businesses. The scheme, which came into force in July 2014,

taking into consideration that the U s. wastes an approximate $2. 8 billion in PC energy every year, the U k. may need to take a more effective approach to energy security.


techcrunch.com 2015 05580.txt.txt

and Facebook to give U k. intelligence agencies access to the encrypted conversations of suspected terrorists and criminals.

and if you believe that the problem the intelligence services face at the moment is a shortage of data then it would address the problem.

and does shroud its arguments in claims of national security secrecy. Saying, in essence, e need more data but we can tell you whyand where the U k. Parliament Intelligence and security committee should be playing a robust role in holding the government to account in such a sensitive area,

The intelligence services play an incredibly important role and we want them to be able to do their jobs in a clear and accountable way.

So U k. police and intelligence agencies obtain whatever CCTV footage theye after from the private operator funding a camera in their shop or carpark or driveway or, hey, even that in-home Dropcam or the lens on that life-logging wearable


techcrunch.com 2015 05591.txt.txt

a bill already passed in the House that would reform National security agency (NSA), in a rare Sunday session.

Passage of the bill would mark the first time lawmakers have reined in the surveillance powers of the intelligence community in the two years since Snowden first revealed the controversial intelligence gathering programs.


tech_review 00335.txt

Cyber-spies Companies and governments spend money on espionage. Cyber-spies use rojansand ack doorsto access data on their targetscomputer networks,


tech_review 00428.txt

#A Simple Plan to Impede the NSA Is Taking hold A year after revelations first emerged from former National security agency contractor Edward Snowden about mass Internet surveillance,


tech_review 00632.txt

Documents leaked last June by former U s. intelligence contractor Edward Snowden revealed a global surveillance operation coördinated by the U s. National security agency and its counterpart in Britain

So pervasive and successful has digital espionage become that in 2012, Keith Alexander, the Army general in charge of the NSA, described it as he greatest transfer of wealth in history.

because the U s. government has claimed long that Huawei gear is a Trojan horse for China intelligence services.


www.biotech-now.org 2015 0000943.txt

and building a biobased economy is key to reducing dependence on foreign oil enhancing our nation economic and energy security.


www.businessinsider.com_sai 2015 00920.txt.txt

the bulk collection of American phone records by the National security agency will no longer be permitted legally, Spencer Ackerman of the Guardian reports.

The section, known as the business-records provision, gave intelligence agencies authorization to seek communications data if he records are relevant to an ongoing foreign intelligence investigation. n appeals court ruled earlier this month that most of the NSA surveillance

Mcconnell measure has support from members of the intelligence community. The Guardian that the GOP leader will have to overcome the appeals court ruling, public dissatisfaction with government surveillance


www.cleantechnica.com 2015 02593.txt.txt

environment and national security. riginal cosponsors of the legislation include: Reps. Matt Cartwright (PA-17; Tony Cardenas (CA-29;


www.dailymail.co.uk_sciencetech 2015 02059.txt.txt

'The cash machine also represents China's first independent intellectual property rights in financial security protection. Apart from the innovative recognition system, the device can also exchange Chinese Yuan to as many as 256 foreign currencies.

China's central government has placed an emphasis on information and financial security. Gu Zikun says this new machine has passed its certification


www.entrepreneur.com 2015 04336.txt.txt

U s. government officials and cyber analysts say Chinese hackers are using high-tech tactics to build massive databases that could be used for traditional espionage goals,


www.environmentalleader.com 2015 01053.txt.txt

and machine learning methods originally developed for data-heavy applications such as national security and the healthcare industry to the oil and gas industry,


www.extremetech.com 2015 0000120.txt

David cameron has used the tragedy as an impetus to call for programs that could make end-to-end encryption illegal in the UK, the grounds of national security.


www.foxnews.com 2015 0000101.txt

The threat came late last week after a Turkish court banned media coverage of a police raid on Turkish Intelligence agency trucks,

citing national security concerns. Prior to the ban, Turkish news outlet Birgun had tweeted images of documents that allegedly showed the convoy had been carrying weapons destined for extremists fighting against the forces of Syrian president Bashar al-Assad.

witter withheld access in Turkey to the small number of tweets that discussed the national security issue.


www.foxnews.com 2015 000023.txt

or national security terms the ruling party uses to describe opposition to communist rule. It said operators will be required to deactivate accounts of violators.


www.nanotech-now.com 2015 00827.txt.txt

as well as in energy technologies and national security. Brookhaven Lab also builds and operates major scientific facilities available to university, industry and government researchers.


www.news.com.au_technology 2015 00457.txt.txt

The final decision will be made by the National security Committee of Cabinet (NSC) in the context of the Defence White paper due out in August.


www.npr.org 2015 000072.txt

"For the national security apparatus, the attack was a wake-up call. President Clinton convened a cybersecurity working group.


www.reuters.com_news_technology 2015 01063.txt.txt

The Federal bureau of investigation said it had launched a probe and would hold the culprits accountable. ADVERTISING OPM detected new malicious activity affecting its information systems in April


www.securityweek.com 2015 02754.txt.txt

which also reauthorizes key national security programs that had lapsed early this week. With the Senate rejecting Republican attempts to modify the bill through three amendments,

"The bill halts the National security agency's ability to scoop up and store metadata--telephone numbers, dates and times of calls,


www.venturebeat.com 2015 01958.txt.txt

since whistleblower Edward Snowden made a series of revelations about how the National security agency (NSA) mines its data from private communications.


www.zdnet.com 2015 03766.txt.txt

Encryption and personal privacy hit the spotlight after former US National security agency (NSA) contractor Edward Snowden released a swathe of confidential files documenting the widespread, bulk data collection and spying activities


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011