SUDAN: Security Agency Boosted
In: Africa research bulletin. Political, social and cultural series, Band 52, Heft 1
ISSN: 1467-825X
6331 Ergebnisse
Sortierung:
In: Africa research bulletin. Political, social and cultural series, Band 52, Heft 1
ISSN: 1467-825X
In: Africa research bulletin. Political, social and cultural series, Band 52, Heft 1
ISSN: 0001-9844
After the September 11, 2001 terrorist attacks, the United States Congress turned its focus towards tightening airport security by voting to standardize airport security nationwide. Before 9/11, airport security was the responsibility of airports and contracted security services utilizing unskilled passenger and baggage screener personnel. Screeners where overworked and received a minimum wage average salary. Many mistakes caused by inadequate employee security training created numerous security vulnerabilities throughout the aviation industry. After the 9/11 attack, a federal government controlled, stricter, and more sweeping passenger and baggage screening replaced this flawed system. With the aid of taxpayer funds, aviation security became part of one agency, the Transportation Security Administration (TSA) (Conti, Shay & Hartzog, 2014).
BASE
After the September 11, 2001 terrorist attacks, the United States Congress turned its focus towards tightening airport security by voting to standardize airport security nationwide. Before 9/11, airport security was the responsibility of airports and contracted security services utilizing unskilled passenger and baggage screener personnel. Screeners where overworked and received a minimum wage average salary. Many mistakes caused by inadequate employee security training created numerous security vulnerabilities throughout the aviation industry. After the 9/11 attack, a federal government controlled, stricter, and more sweeping passenger and baggage screening replaced this flawed system. With the aid of taxpayer funds, aviation security became part of one agency, the Transportation Security Administration (TSA) (Conti, Shay & Hartzog, 2014).
BASE
In: The American journal of sociology, Band 58, Heft 1, S. 127-127
ISSN: 1537-5390
In: Europäische Sicherheit & Technik: ES & T ; europäische Sicherheit, Strategie & Technik, Band 62, Heft 8, S. 22-26
ISSN: 2193-746X
Verwirrend vielfältig erscheint dem externen Beobachter die Anzahl und Ausrichtung der US-Nachrichtendienste. Derzeit im Mittelpunkt weltweiten Interesses steht die NSA. die National Security Agency. Sie ist das elektronische Zentrum der amerikanischen Intelligence Community und steht derzeit im Verdacht, über Facebook, Google, Apple und Microsoft persönliche Daten von Internetnutzern erhoben zu haben. (Europäische Sicherheit & Technik / SWP)
World Affairs Online
In: Gerginova, Tatjana (2020) National Security Agency in the Republic of North Macedonia. ЗБОРНИК од Меѓународнанаучнаистручнаконференција: "Реформатананационалниотбезбедносенсистемво контекстнаНАТОиЕУинтеграцијата" (1). pp. 174-183.
In the introductory part of the paper the author will provide some definitions of security, national security, security system. The author will further define the role of the Security and Counter-intelligence Bureau and explain the need for reforms in the security and intelligence community of the Republic of North Macedonia with particular reference to the role of the National Security Agency. The author will also explain the reasons for the need for the National Security Agency to be established as a new independent state administration body for the purpose of ensuring the internal security of the state and carrying out counter-intelligence activities, with the aim of creating a reformed, professional, independent and accountable institution. The subject of research in this paper is the Reform of the Security Intelligence Services in the Republic of North Macedonia. The purpose of the research is to establish a credible security system based on European standards and practices. Keywords: security, national security, National security agency, Security and counterintelligence directorate
BASE
In: Security dialogue, Band 54, Heft 1, S. 3-20
ISSN: 1460-3640
This introduction to the special issue on 'the technopolitics of security' outlines key concepts and engages debates pertaining to the relationship between techno-materiality, security governance and struggles over sovereignty. 'Technopolitics' refers to the strategic practice of designing and using technologies to enact political goals, producing hybrid forms of power that combine cultural, institutional and technological dimensions. These technopolitical practices give rise to new forms of agency, producing effects unintended by their designers that may alter logics of political contestation and allow technologies to be reappropriated for different political purposes. To illustrate the distributed forms of agency and contingent encounters that the technopolitics approach evokes, the article develops three key aspects of technopolitics in its relationship to security governance: (1) an understanding of agency as distributed between human and non-human actors, but also asymmetric in that human intentionality plays an assembling role that is frequently overrun by the unintended effects; (2) the temporal horizons of imagination and action over which technopolitical interventions unfold, identifying the importance of logics of anticipation and eventization; and (3) the relationship between technopolitics and sovereignty, arguing that it encourages a decentred and materialized understanding of how claims to sovereignty are made and contested.
In: The Polish journal of the arts and culture, Heft 17 (1/2023), S. 53-67
ISSN: 2450-6249
The history of astrology in twentieth-century Hungary has not yet been a subject of research. Consequently, the attitude of Hungarian state security agency towards astrologers and astrology during the communist era is unknown – especially since the files of agents have not been made public in Hungary. In the present article, I examine the question through the cases of Sándor Raisz, András László, Zoltán Lemhényi and Viktor Juhász-Schlatter, using sources preserved in the Historical Archives of the Hungarian State Security Services (Állambiztonsági Szolgálatok Történeti Levéltára). I conclude that the secret service was only interested in astrologers because they met regularly with their students, all regular and secret meetings being politically suspicious. Astrology as an illegal activity or a subject of contempt only appears in sources from the 1980s. All the astrologers discussed in my article were in one way or another opposed to the ruling communist regime. Part of the reason for this is that astrology was a popular intellectual, middle-class activity in the Horthy era, and representatives of this stratum were considered enemies of the regime after 1945. Also, the communist system represented an avowedly materialist ideology, while astrology flourished primarily among those interested in mysticism, theosophy and anthroposophy. The picture that emerges from the sources is that astrology classes were not overtly political, but their participants were nevertheless bound together by the knowledge that they were listening to forbidden, secret teachings. In this respect, astrology can be classified as counterculture in the era. The topic also offers a valuable insight into the overlapping subcultures in twentieth-century Hungary.
In: Telos, Heft 169
ISSN: 0040-2842, 0090-6514
Pan argues that the status of the NSA is changing profoundly due to the Internet and the corollary transformation of the public sphere. While Edward Snowden's revelations were indeed a turning point, this sudden forcing of the NSA into the limelight of American politics after its history of secrecy has ultimately been the result of a long-term process in which it has had to adapt to the blurring of the border between private and public in both its foreign intelligence and domestic security missions. Adapted from the source document.
The companion to the Oscar-nominated documentary, an unparalleled look inside Israel's security establishment.Imagine the following situation: You have just received a tip that six suicide bombers are making their way into the heart of Israel's major cities, each one to a different city, to set off an explosion in the most crowded centers of population. How far would you go to stop the attack? How would you sleep at night if you failed and one of the six terrorists reached his target and murdered dozens of innocent people? What would you do the next morning to extract your country from this mu
In: Intelligence and national security, Band 16, Heft 1, S. 27-66
ISSN: 1743-9019
In: Intelligence and national security, Band 16, Heft 1, S. 27-66
ISSN: 0268-4527
This study focuses on NSA's 55-year intelligence collection effort against the former Soviet Union during the Cold War. All available evidence indicates that NSA's Sigint product was an essential means by which the US intelligence community was kept apprised of what was going on inside the Soviet Union, despite the fact that NSA was oftentimes unable to solve Russia's most important encryption systems. The ability to adapt & apply its superior technological wherewithal to overcome obstacles was a hallmark of NSA's Cold War efforts. When it could not crack the Soviet Union's most important encryption systems, NSA appears to have gone around the problem & exploited less important systems that proved to be important sources of intelligence information. NSA also worked closely with other branches of the US intelligence community, such as its work with the CIA & the FBI to obtain foreign cryptologic materials by clandestine means, its joint effort with the National Reconnaissance Office to field Sigint satellites, & its close collaboration with the US Navy to tap undersea communications cables. 3 Figures. Adapted from the source document.