Letteratura scientifica selezionata sul tema "Secret Services Intelligence"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Secret Services Intelligence".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Secret Services Intelligence"
Fellows, Jamie, e Mark D. Chong. "Australian Secret Intelligence Service’s new powers: A step too far towards extraterritorial killings?" Alternative Law Journal 44, n. 4 (30 settembre 2019): 302–7. http://dx.doi.org/10.1177/1037969x19873479.
Testo completoHardy, Roger. "Israel's secret wars: a history of Israel's intelligence services". International Affairs 68, n. 2 (aprile 1992): 371. http://dx.doi.org/10.2307/2623301.
Testo completoFreedman, Robert O., Ian Black e Benny Morris. "Israel's Secret Wars: A History of Israel's Intelligence Services." American Historical Review 98, n. 2 (aprile 1993): 538. http://dx.doi.org/10.2307/2166941.
Testo completoBandi, István. "Contributions to the history of the Hungarian pontifical institute from the perspective of the Hungarian secret services during the cold war". Studia Universitatis Moldaviae. Seria Ştiinţe Umanistice, n. 10(180) (aprile 2024): 58–68. http://dx.doi.org/10.59295/sum10(180)2023_07.
Testo completoMinkina, Mirosław. "Russian secret services in the so-called special operation in Ukraine". Przegląd Wschodnioeuropejski 14, n. 2 (24 dicembre 2023): 125–38. http://dx.doi.org/10.31648/pw.9707.
Testo completoSánchez Barrilao, Juan Francisco. "Servicios de inteligencia, secreto y garantía judicial de los derechos". Teoría y Realidad Constitucional, n. 44 (15 novembre 2019): 309. http://dx.doi.org/10.5944/trc.44.2019.26004.
Testo completoBraat, Eleni. "Loyalty and Secret Intelligence: Anglo‒Dutch Cooperation during World War II". Politics and Governance 6, n. 4 (28 dicembre 2018): 159–67. http://dx.doi.org/10.17645/pag.v6i4.1556.
Testo completoRosicki, Remigiusz. "State Security and Individual Security as Exemplified by the Recruitment of Secret Collaborators by the Polish Intelligence Service". Polish Political Science Yearbook 51 (31 dicembre 2022): 1–19. http://dx.doi.org/10.15804/ppsy202255.
Testo completoLuțai, Raluca. "European intelligence services just signed up on social media. An analysis of secret services and social media platforms". Studia Universitatis Babeș-Bolyai Studia Europaea 67, n. 2 (30 dicembre 2022): 199–223. http://dx.doi.org/10.24193/subbeuropaea.2022.2.08.
Testo completoBIZADEA, George. "HMONG. THE SECRET ARMY". STRATEGIES XXI - National Defence College 1, n. 72 (15 luglio 2021): 356–64. http://dx.doi.org/10.53477/2668-5094-21-25.
Testo completoTesi sul tema "Secret Services Intelligence"
Ritchey, David (David Benjamin. "George Washington's Development as an Espionage Chief". Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc500803/.
Testo completoLe, Voguer Gildas. "Secret et démocratie dans l'Amérique de l'après-guerre : le contrôle parlementaire de l'activité des services de renseignement, 1947-1987". Orléans, 1992. http://www.theses.fr/1995ORLE1012.
Testo completoDe, Witte Parra Mona. "La protection du renseignement britannique, américain et allemand pendant la Seconde Guerre mondiale". Thesis, Reims, 2016. http://www.theses.fr/2016REIML004.
Testo completoThis thesis investigates the protection of British intelligence sources during World War Two, and includes a comparison with American and German practices. In these three countries, intelligence officers adopted very different approaches to preserve these sources and to ensure that the latter could be used in the long term. Each country had a different perception of the balance between the immediate use of intelligence and the protection of its sources, between the short-term benefits and long-term preservation of these assets in the context of the war. Drawing on a vast amount of archival material, both civilian and military, this research presents these three countries’ various approaches and uses this analysis to reflect on their concrete achievements. This study interrogates the preconceived ideas about these countries’ intelligence practices, in particular the reputation of secrecy of the British agencies, as opposed to the lack of discretion of their American counterparts. Moreover, this thesis emphasises the particular situation of German secret services in a very divided country.The ambiguous cooperation between Britain and the United States during the Second World War helped pave the way for their « special relationship ». During the war, the balance of power between the two nations shifted dramatically, in the intelligence field as in many others. Moreover, the analysis of the exchanges between the British intelligence officers and their French and Soviet colleagues opens new research avenues in the study of their international relations and on these complex and fluctuating alliances
Couderc, Agathe. "Sous le sceau du secret : les coopérations internationales des Chiffres britannique et français, militaires et navals pendant la Première Guerre mondiale". Electronic Thesis or Diss., Sorbonne université, 2022. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2022SORUL060.pdf.
Testo completoAt the end of the 19th century, thanks to the evolution of telecommunications, military and naval circles rediscover cryptology, also known as “science of secret writing”, and become more and more interested by it. Its quick development in wartime can be depicted by the creation or expansion of several units, called “Cipher services”, in France and in the United Kingdom. These services have two missions: protecting the national and allied communications, and attacking the secret codes of the enemy. Their growth during the First World War illustrates the emergence of a brand new branch of intelligence and its reflection in counter-espionage: signals intelligence, or SIGINT. A comparison between the French and British Cipher services within their armed forces shows that there were similarities in the establishment of these services, particularly in recruiting personnel whom were subject to secrecy, although the temporalities of certain missions differed. Within the Entente Cordiale, a secret, joint and allied cooperation was established between the various French and British signals intelligence services. This alliance included the creation of shared codes, as well as the sharing of information resulting from the interception and decrypting of enemy communications. It thus highlights the importance of cryptology for the Franco-British alliance in the fight against the Central Empires, which can also be observed in their other alliances, such as the one with the Americans. It also sheds light on the extent to which this intelligence specialty took on in the conduct of the war, which explains the shape taken by the French and British Ciphers after the war
Blistène, Pauline. "Voir et faire voir le secret de l'État : fonctions et enjeux de la fiction d’espionnage contemporaine". Thesis, Paris 1, 2020. http://www.theses.fr/2020PA01H219.
Testo completoWhat is the political, moral and philosophical value of “spy fiction”? This dissertation examines this question using an innovative methodology that combines an analysis of contemporary television series (Homeland, Le Bureau des Légendes) and interviews with intelligence practitioners (CIA, DGSE) along with entertainment professionals (showrunners, screenwriters). My thesis is that there is a change in the ontological and epistemic status of spy films and TV series due to the involvement of real spies in their creation. The political and philosophical importance of spy fiction manifests itself in the impact of spy fiction on the political and social reality: the “realism” of spy fiction that I define here departs from common conceptions of correspondence to reality and replaces it with an approach that locates agency at the heart of the analysis. This approach does not stipulate the blurring of fact and fiction, but instead reaffirms its importance as a hypothesis for the production and reception of cultural artifacts. In a context where the demand for information concerning clandestine activities of the state keeps growing, the interactions between intelligence and entertainment professionals allow the former to stage their own disclosure without revealing their real activities. Far from contributing to the abolition of the frontier of secrecy, such practices contribute to its displacement, thus allowing a renewal of secrecy under the appearance of transparency. State secrets are never revealed but only signified
Guillaumin, Béatrice. "L'appareil français de renseignement : une administration ordinaire aux attributs extraordinaires". Electronic Thesis or Diss., Paris 1, 2021. https://ecm.univ-paris1.fr/nuxeo/site/esupversions/87fa596a-79d4-4f38-89d4-aca7a78356b9.
Testo completoSince the end of the 2000s, the integration of the intelligence apparatus into the French administrative and institutional landscape has been indisputable: legal framework for its activities, redefinition of the link maintained with the executive branch, plural control to which it is now subject, etc. While this normalisation should be verified, it will be more essential to assess its scope. At the threshold of the study, a bundle of clues can be released to corroborate the process of a substantial normalisation of the intelligence apparatus. However, it cannot disappear and merge entirely into the administrative matrix. In this hypothesis, while the normalisation process intends to erase the originalities of the intelligence apparatus, it actually generates a paradoxical movement: new originalities have been added. Thus considered, the alignment of the intelligence apparatus on the administrative model remains limited by a certain number of elements which shape an administration with a singular appearance, oscillating between normality and originality. To be convinced of this, the aim is to emphasise that the normalisation of the intelligence apparatus takes place by the conjunction of two movements in perfect synchronization. The first relates to the legal framework of the intelligence apparatus which constitutes the apanage of this normalisation. The second is triggered by the tightening of control over the intelligence apparatus, the mechanism of which appears to be the markers of this normalisation
Davies, Philip H. J. "Organisational development of Britain's Secret Intelligence Service 1909-1979". Thesis, University of Reading, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.363245.
Testo completoRamondy, Karine. "1958-1961 : l'assassinat des leaders africains, un "moment" de construction nationale et de régulation des relations internationales (étude comparée en Afrique centrale)". Thesis, Paris 1, 2018. http://www.theses.fr/2018PA01H006.
Testo completoThrough a close examination of the trajectory of four African leaders, Barthélémy Boganda (Republic of Central Africa), Patrice Lumumba (Republic of Congo), Félix Moumié et Ruben Um Nyobé (Cameroun), during the independence era, and by means of the historical anthropology, the comparative method and focusing on Central Africa, this study tries to explore to what extent political assassination could constitute a way of regulating international relationships and lay the foundations of the national construction of their country of origins. Along their political career path, their UN-related and Pan–Africanism disillusionment that tightens around them the lethal noose of a Realpolitik caught between bipolarization and neo-colonialism will be referred to. The other hypothesis developed here is as followed : it could be possible through comparative history to bring out invariance within political assassination under the forms of recurrent processes such as the judiciary weapon, the media weapon, the lack of a decent burial place and the damnatio memoriae they’ve been sentenced to which all contrastingly led to a symbolic and iconic reversal. The study relies on numerous sources that complete each other in order to reconstitute the chain of events and allow new interpretations: private exclusive archives, public archives, some of which having been declassified for this purpose, audio-visual and printed sources, exclusive oral narratives collected by the author
Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)". Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040174.
Testo completoThis work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
Genêt, Stéphane. "Renseignement militaire et actions secrètes de la guerre de succession d’Autriche au traité de Paris (1740-1763)". Electronic Thesis or Diss., Paris 4, 2010. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2010PA040174.pdf.
Testo completoThis work tackles the question of the military intelligence from the war of Austrian succession (1740) to the treaty of Paris (1763). The military intelligence is initially replaced in the strategic thinking of the period which evokes it little while paradoxically highlighting its importance for the armies. The various sources of military information are the second part. The army Spy, unrecognized figure of the period, plays a daily role within the armies of the Ancien Regime. Located at the margins of society and the military sphere, attracted by profit but also by the sense of adventure, social recognition or induced by a nascent patriotism, the spy takes risks to satisfy a sleeping partner. The third part focuses on the military secret, hard to preserve and unveiled in logic of networks, at different scales and in a more or less complex organizations. The spy takes part of a personal relationship with a supervisor whom he is the "client." The study examines in a final time the transmission and protection of information obtained. The risks are varied (postal interception but especially enemy spies). The conclusion raises the question of the effectiveness of the military information, not very decisive because of the logistic constraints and widespread distrust about information and the actors who collect them. In a period of structuring of the army and centralization of political power, military intelligence is in contrary a decentralized operation. The need for reliable information leads to a militarization of civilians, transforming them into auxiliary information
Libri sul tema "Secret Services Intelligence"
Rooney, Anne. Secret services. Mankato, MN: Smart Apple Media, 2010.
Cerca il testo completoDavies, Philip H. J. The British secret services. Oxford, England: ABC-Clio, 1996.
Cerca il testo completoMartyn, Cornick, e Morris Peter, a cura di. The French secret services. New Brunswick, N.J: Transaction Publishers, 1993.
Cerca il testo completoCornick, Martyn. The French secret services. Oxford: Clio Press, 1993.
Cerca il testo completoCornick, Martyn. The French secret services. New Brunswick, U.S.A: Transaction Publishers, 1993.
Cerca il testo completoLester, Normand. Enquêtes sur les services secrets. [Saint-Laurent]: Édition du Club Québec loisirs, 1998.
Cerca il testo completoFrank, Clements. Israeli Secret Services. New Brunswick, N.J: Transaction Publishers, 1996.
Cerca il testo completoGuisnel, Jean. Services secrets: Le pouvoir et les services de renseignements sous la présidence de François Mitterrand. Paris: La Découverte, 1988.
Cerca il testo completoJ, Dziak John, e Consortium for the Study of Intelligence., a cura di. Bibliography on Soviet intelligence and security services. Boulder: Westview Press, 1985.
Cerca il testo completoJunghans, Pascal. Les services de renseignements français. Boulogne: Éditions Edmond Dantès, 2006.
Cerca il testo completoCapitoli di libri sul tema "Secret Services Intelligence"
Bigo, Didier. "Transformations of the transnational field of secret services". In Intelligence Oversight in Times of Transnational Impunity, 70–97. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003354130-3.
Testo completoYan, Xuehu, Jinming Li, Yuliang Lu, Lintao Liu, Guozheng Yang e Huixian Chen. "Relations Between Secret Sharing and Secret Image Sharing". In Security with Intelligent Computing and Big-data Services, 79–93. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_7.
Testo completoO’Sullivan, Adrian. "Six: His Britannic Majesty’s Secret Intelligence Service". In The Baghdad Set, 169–79. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15183-6_8.
Testo completoCao, Lai-Cheng. "Secure Negotiation Approach for Share-Secret-Key of Kerberos Service". In Artificial Intelligence and Computational Intelligence, 101–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23887-1_13.
Testo completoShyu, Shyong Jian, e Ying Zhen Tsai. "Shamir’s Secret Sharing Scheme in Parallel". In Security with Intelligent Computing and Big-data Services, 206–16. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76451-1_20.
Testo completoRobles, Ramiro Samano, R. Venkatesha Prasad, Ad Arts, Mateusz Rzymowski e Lukasz Kulas. "Artificial Intelligence for Wireless Avionics Intra-Communications". In Intelligent Secure Trustable Things, 331–52. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54049-3_18.
Testo completoXia, Zhe, Zhen Yang, Shengwu Xiong e Ching-Fang Hsu. "Game-Based Security Proofs for Secret Sharing Schemes". In Security with Intelligent Computing and Big-data Services, 650–60. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_53.
Testo completoLiu, Yan-Xiao, e Ching-Nung Yang. "Enhanced Secret Image Sharing Using POB Number System". In Security with Intelligent Computing and Big-data Services, 94–102. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_8.
Testo completoLi, Long, Tianlong Gu, Liang Chang e Jingjing Li. "Efficient Computation Method of Participants’ Weights in Shamir’s Secret Sharing". In Security with Intelligent Computing and Big-data Services, 598–605. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_48.
Testo completoAdams, Robyn. "A Most Secret Service: William Herle and the Circulation of Intelligence". In Diplomacy and Early Modern Culture, 63–81. London: Palgrave Macmillan UK, 2011. http://dx.doi.org/10.1057/9780230298125_5.
Testo completoAtti di convegni sul tema "Secret Services Intelligence"
Miteva, Boryana. "Bulgarian scientific and technical intelligence in Japan during the Cold War". In 9th International e-Conference on Studies in Humanities and Social Sciences. Center for Open Access in Science, Belgrade - Serbia, 2023. http://dx.doi.org/10.32591/coas.e-conf.09.06055m.
Testo completoTaneski, Nenad, Sinisha Vitanovski e Aleksandar Petrovski. "THE PLACE AND ROLE OF THE INTELLIGENCE AND COUNTERINTELLIGENCE SERVICES". In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p28.
Testo completoAlmaghaslah, A. M. "Incorporating Human Aspect into Service Contract Procurement". In ADIPEC. SPE, 2023. http://dx.doi.org/10.2118/216370-ms.
Testo completo"IOT Based Secure Data Storage System Using Cryptographic Algorithm". In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/vdgo3829/ngcesi23p69.
Testo completoBissoli, Andrea, e Fabrizio d'Amore. "Authentication as A Service Based on Shamir Secret Sharing". In 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC). IEEE, 2021. http://dx.doi.org/10.1109/iscsic54682.2021.00072.
Testo completoAlameldin, Magdi. "Smart Predictive Maintenance Framework SPMF for Gas and Oil Industry". In International Petroleum Technology Conference. IPTC, 2022. http://dx.doi.org/10.2523/iptc-22497-ms.
Testo completoSihvonen, Markus. "Hybrid intelligent logistics system for a recycling center". In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1005251.
Testo completoDewangan, Kheelesh Kumar, Vibek Panda, Sunil Ojha, Anjali Shahapure e Shweta Rajesh Jahagirdar. "Cyber Threats and Its Mitigation to Intelligent Transportation System". In Symposium on International Automotive Technology. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2024. http://dx.doi.org/10.4271/2024-26-0184.
Testo completoAdamson, Göran, Lihui Wang e Magnus Holm. "The State of the Art of Cloud Manufacturing and Future Trends". In ASME 2013 International Manufacturing Science and Engineering Conference collocated with the 41st North American Manufacturing Research Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/msec2013-1123.
Testo completoPlacinta, Dimitriedaniel. "THE IMPACT OF AI/MACHINE LEARNING IN EDUCATION". In eLSE 2021. ADL Romania, 2021. http://dx.doi.org/10.12753/2066-026x-21-004.
Testo completoRapporti di organizzazioni sul tema "Secret Services Intelligence"
Payment Systems Report - June of 2020. Banco de la República de Colombia, febbraio 2021. http://dx.doi.org/10.32468/rept-sist-pag.eng.2020.
Testo completo