ⓘ Free online encyclopedia. Did you know? page 954

Stop Huntingdon Animal Cruelty

Stop Huntingdon Animal Cruelty was an international animal rights campaign to close down Huntingdon Life Sciences, Europes largest contract animal-testing laboratory. SHAC ended its campaign in August 2014. HLS tests medical and non-medical subst ...

Susie's Law

Susies Law is a 2010 North Carolina state law which authorizes up to two years in jail for convicted perpetrators of cruelty to animals.

Taghairm

Taghairm, sometimes interpreted as "spiritual echo," or calling up the dead, was an ancient Scottish mode of divination. The definition of what was required varied, but involved torture or cruelty to animals or humans and sometimes included anima ...

Taiwanese chicken-beheading rituals

Chicken-beheading rituals are a quasi-judicial ritual in Taiwanese culture that have acted as a dispute resolution mechanism for complicated and emotionally charged disputes that have not been settled in traditional courts or through private medi ...

Tame bear

A tame bear, often called a dancing bear, is a wild bear captured when the animal was young, or born and bred in captivity, and used to entertain people in streets or taverns. Dancing bears were commonplace throughout Europe and Asia from the Mid ...

Tendonectomy

Performing a tendonectomy on a cat is an alternative to onychectomy "declawing", which amputates the end of each digit. Tendonectomy may be considered less painful for the cat than onychectomy; however, it is not recommended by the American Veter ...

Topsy (elephant)

Topsy was a female Asian elephant who was killed by electrocution at Coney Island, New York, in January 1903. Born in Southeast Asia around 1875, Topsy was secretly brought into the United States soon thereafter and added to the herd of performin ...

Toro embolado

A toro embolado, bou embolat, roughly meaning bull with balls, is a festive activity, typical of many towns in Spain, in which a bull that has balls of flammable material attached to its horns, which are set on fire, is set free in the streets at ...

Tyke (elephant)

Tyke was a female African bush elephant from Mozambique who performed with Circus International of Honolulu, Hawaii. On August 20, 1994, during a performance at the Neal Blaisdell Center, she killed her trainer, Allen Campbell, and seriously inju ...

Western Australian shark cull

The Western Australian shark cull is the common term for a former state government policy of capturing and killing large sharks in the vicinity of swimming beaches by use of baited drum lines. The policy was implemented in 2014 to protect human s ...

Wild animal suffering

Wild animal suffering is the suffering experienced by nonhuman animals in nature through causes such as disease, injury, parasitism, starvation, natural disasters, and killings by other animals. Wild animal suffering has historically been discuss ...

Vladimir Zhirinovsky's donkey video

On 6 February 2012, Vladimir Zhirinovsky, the far-right populist leader of the nationalist Liberal Democratic Party of Russia, released a 30-second election video on the Internet that featured him on a sleigh which was harnessed with a black donk ...

Ziggy (elephant)

Ziggy was a male Indian elephant who lived at Brookfield Zoo outside Chicago from 1936 to 1975. He weighed about six tons and was over ten feet tall. After attacking and nearly killing his keeper in 1941, Ziggy was chained to the wall of an indoo ...

Data breach

A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak, information leakage and ...

List of data breaches

This is a list of data breaches, using data compiled from various sources, including press reports, government news releases, and mainstream news articles. The list includes those involving the theft or compromise of 30.000 or more records, altho ...

2012 Yahoo! Voices hack

Yahoo! Voices, formerly Associated Content, was hacked in July 2012. The hack is supposed to have leaked approximately half a million email addresses and passwords associated with Yahoo! Contributor Network. The suspected hacker group, D33ds, use ...

2014 Russian hacker password theft

The 2014 Russian hacker password theft is an alleged hacking incident resulting in the possible theft of over 1.2 billion internet credentials, including usernames and passwords, with hundreds of millions of corresponding e-mail addresses. The da ...

2018 Google data breach

The 2018 Google data breach was a major scandal in late 2018 when Google engineers discovered a software leakage within the Google+ API used in the social media network. As over five million users data was compromised. This led to the immense new ...

Ashley Madison data breach

In July 2015, a group calling itself "The Impact Team" stole the user data of Ashley Madison, a commercial website billed as enabling extramarital affairs. The group copied personal information about the sites user base and threatened to release ...

Collection No. 1

Collection #1 is the name of a set of email addresses and passwords that appeared on the dark web around January 2019. The database contains over 773 million unique email addresses and 21 million unique passwords, resulting in more than 2.7 billi ...

Commission on Elections data breach

On March 27, 2016, hackers under the banner, Anonymous Philippines hacked into the website of the Philippine Commission on Elections and defaced it. The hackers left a message calling for tighter security measures on the vote counting machines to ...

Data center security

Data center security is the set of policies, precautions and practices adopted to avoid unauthorized access and manipulation of a data centers resources. The data center houses the enterprise applications and data, hence why providing a proper se ...

2016 Democratic National Committee email leak

The 2016 Democratic National Committee email leak is a collection of Democratic National Committee emails stolen by one or more hackers operating under the pseudonym "Guccifer 2.0" who are alleged to be Russian intelligence agency hackers, accord ...

Facebook–Cambridge Analytica data scandal

The Facebook–Cambridge Analytica data scandal was a major political scandal in early 2018 when it was revealed that Cambridge Analytica had harvested the personal data of millions of peoples Facebook profiles without their consent and used it for ...

Football Leaks

Football Leaks is the largest leak in the history of sports, revealing "murky" financial transactions in the world of European professional football and exposes the tax tricks employed by some of the continents biggest stars. It began with a seri ...

Medical data breach

A medical data breach is a data breach of health information, and could include either the personal health information of any individuals electronic health record or medical billing information from their health insurance. In the United States th ...

Swiss Leaks

Swiss Leaks is the name of a journalistic investigation, released in February 2015, of a giant tax evasion scheme allegedly operated with the knowledge and encouragement of the British multinational bank HSBC via its Swiss subsidiary, HSBC Privat ...

Syria Files

On 5 July 2012, WikiLeaks began publishing what it called the Syria Files, a collection of more than two million emails from Syrian political figures and ministries and from companies including Finmeccanica and Brown Lloyd James dating from Augus ...

Vietnamese airports hackings

On 29 July 2016, a group suspected coming from China launched hacker attacks on the website of Vietnam Airlines with client information leaked and on flight information screens at Vietnam’s 2 biggest airports, Tan Son Nhat International Airport a ...

WhatsApp snooping scandal

On October 30 2019, WhatsApps parent company Facebook confirmed that Pegasus, a sophisticated snooping software developed by Israel’s NSO Group, was used to target Indian journalists, activists, lawyers and senior government officials. The journa ...

Acid attack

An acid attack, also called acid throwing, vitriol attack, or vitriolage, is a form of violent assault involving the act of throwing acid or a similarly corrosive substance onto the body of another "with the intention to disfigure, maim, torture, ...

An-Nisa, 34

An-Nisa, 34 refers to the 34th verse of the fourth surah of the Quran, An-Nisa. This verse discusses the husbands role as "protector and maintainer" of his wife and how he should deal with disloyalty on her part. Scholars vastly differ on the imp ...

John and Lorena Bobbitt

John Wayne Bobbitt and Lorena Bobbitt were an American couple married on June 18, 1989 whose relationship made world-wide headlines in 1993 when, after years of being allegedly raped, beaten, and sodomized by her husband, Lorena cut off his penis ...

Boyfriend Loophole

The term boyfriend loophole refers to a gap in American gun legislation that allows access to guns by physically abusive ex-boyfriends and stalkers with previous convictions. While individuals who have been convicted of, or are under a restrainin ...

Bride burning

Bride burning is a form of domestic violence practiced in countries located on or around the Indian subcontinent. A category of dowry death, bride-burning occurs when a young woman is murdered by her husband or his family for her familys refusal ...

Soledad Cazorla

Soledad Cazorla Prieto was a jurist and the first Spanish prosecutor against gender violence. She directed a network of fiscal specialists who worked in this field in Spain after the creation of the 2004 Integral Law against Gender Violence. She ...

Child contact centre

A contact centre is a neutral place where children of separated families can enjoy contact with their non-resident parents and sometimes other family members, in a comfortable and safe environment. Child contact services are classified into two d ...

Conflict tactics scale

The conflict tactics scale, created by Murray A. Straus in 1979, is the "most widely used instrument in research on family violence." There are two versions of the CTS; the CTS2 and the CTSPC. As of 2005, the CTS has been used in about 600 peer r ...

Domestic Abuse Restraining Order

A Domestic Abuse Restraining Order is a form of restraining order or order of protection used under the domestic abuse laws of the state of Wisconsin and enforceable nationwide under invocation of the Full Faith and Credit Clause in the Violence ...

Domestic violence among Korean-American immigrants

Korean-Americans represent the fifth-largest group among Asian Americans, amounting to 1.076.872 living in the United States. Within the U.S, Korean-Americans have become associated as a "model minority", meaning that their lives are stable and p ...

Domestic Violence and Victim Support Unit

The Domestic Violence and Victim Support Unit is a unit in the Ghana Police Service. It has the capacity to oversee matters of domestic abuse against women and children. DOVVSU has a mission to prevent, apprehend and prosecute culprits of domesti ...

Domestic violence in lesbian relationships

Domestic violence within lesbian relationships is the pattern of violent and coercive behavior in a female same-sex relationship wherein a lesbian or other non-heterosexual woman seeks to control the thoughts, beliefs, or conduct of her female in ...

Domestic violence in same-sex relationships

Domestic violence in same-sex relationships is a pattern of violence or abuse that occurs within same-sex relationships. Domestic violence is an issue that affects people of any sexuality, but there are issues that affect victims of same-sex dome ...

Domestic Violence, Crime and Victims Act 2004

The Domestic Violence, Crime and Victims Act 2004 is an Act of the Parliament of the United Kingdom. It is concerned with criminal justice and concentrates upon legal protection and assistance to victims of crime, particularly domestic violence. ...

Dowry death

Dowry deaths are deaths of married women who are murdered or driven to suicide by continuous harassment and torture by their husbands and in-laws over a dispute about their dowry, making the womens homes the most dangerous place for them to be. D ...

Effects of domestic violence on children

Effects of domestic violence on children, result from witnessing domestic violence in a home where one of their parents are abusing the other parent, plays a tremendous role on the well-being and developmental growth of children witnessing the vi ...

Family Violence Prevention and Services Act

The Family Violence Prevention and Services Act is a United States law, first authorized as part of the Child Abuse Amendments of 1984, that provides federal funding to help victims of domestic violence and their dependent children by providing s ...

Fundacion Mujeres en Igualdad

The Fundacion Mujeres en Igualdad, known in English as the Women in Equality Foundation, is an Argentine NGO created in March 1990. It has been awarded consultative status with United Nations ECOSOC. The foundation sets out to combat gender based ...

Godelieve

Tradition, as recorded in her Vita, states that she was pious as a young girl, and became much sought after by suitors as a beautiful young woman. Godelieve, however, wanted to become a nun. A nobleman named Bertolf Berthold of Gistel, however, d ...

International Violence Against Women Act

The International Violence Against Women Act of 2015 is proposed legislation to address violence against women through United States foreign policy. The legislation was introduced in the 114th United States Congress in March, 2015. Similar legisl ...