ⓘ Free online encyclopedia. Did you know? page 956

Total Espionage doctrine

Total Espionage doctrine is a specific approach to intelligence gathering, implicating as many variable sources as possible. It combines political, economic, financial, military and industrial espionage. Like other types of espionage, it is subdi ...

Trout memo

The Trout Memo, written in 1939, is a document comparing deception of an enemy in wartime with fly fishing. Issued under the name of Admiral John Godfrey, Britains director of naval intelligence, according to the historian Ben Macintyre it bore t ...

Turla (malware)

Turla or Uroboros is a Trojan package that is suspected by computer security researchers and Western intelligence officers to be the product of a Russian government agency of the same name.

UKUSA Agreement

The United Kingdom – United States of America Agreement is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intelligence operations ...

United States intelligence operations abroad

The United States is widely considered to have the most extensive and sophisticated intelligence network of any nation in the world, with notable suborganizations including the Central Intelligence Agency and the National Security Agency, amongst ...

Upstream collection

Upstream collection is a term used by the National Security Agency of the United States for intercepting telephone and Internet traffic from the Internet backbone, i.e. major Internet cables and switches, both domestic and foreign. Besides the Up ...

U.S. Army Field Manual 30-31B

U.S. Army Field Manual 30-31B is a document claiming to be a classified appendix to a U.S. Army Field Manual that describes top secret counter insurgency tactics. In particular, it identifies a "strategy of tension" involving violent attacks whic ...

John Vassos

John Vassos whose career as an American industrial designer and artist helped define the shape of radio, television, broadcasting equipment, and computers for the Radio Corporation of America for almost four decades. He is best known for both his ...

Village files

Village files were military intelligence documents based on a card index system, with detailed data on every Arab village in Mandatory Palestine. Gathered by the SHAI, they were the basis of Haganah and Palmah operations during the 1940s. The fil ...

Voiceless Victims

Voiceless Victims is a fake non-profit organization based in Lille, France. It claims to raise awareness for migrant workers who are victims of human rights abuses in Qatar. However, in December 2016, several news outlets like Le Monde and Forbes ...

Who's Who in the CIA

Whos Who in CIA is a book written by the East German journalist Julius Mader and published in East Berlin in 1968, under Stasi auspices and probably with KGB assistance. Mader was a writer employed by the East German Military publishing house and ...

World's second oldest profession

The English idiom worlds second-oldest profession is used to refer to a number of professions, playing on the common comment that prostitution is the worlds oldest profession. One frequent use of the phrase is to refer to spies and spying. An exp ...

Arnott's Biscuits

Arnotts Biscuits Limited is Australias largest producer of biscuits and the second-largest supplier of snack food. American private equity firm Kohlberg Kravis Roberts bought Arnotts from the Campbell Soup Company in 2019.

Clip joint

A clip joint or fleshpot is an establishment, usually a strip club or night club in which customers are tricked into paying excessive amounts of money, for surprisingly low-grade goods or services - or sometimes, nothing - in return. Typically, c ...

External debt of Haiti

The external debt of Haiti is one of the main factors that has caused the countrys persistent poverty. After the slaves declared themselves free and the country independent in 1804, France demanded that the newly formed country pay the French gov ...

Hafta

Hafta is the Persian word for week and is also used as a loanword in Hindi, Sylheti, Urdu and Turkish. A week has seven days, and "Hafta" is of 15 days. A week in Hindi means "saptaha" derived from Sanskrit सप्ताह, from सप्तन्. Hafta Devanagari: ...

Harvey's Resort Hotel bombing

The Harveys Resort Hotel bombing took place on August 26–27, 1980, when three men planted an elaborately booby trapped bomb containing 1.000 pounds of dynamite at Harveys Resort Hotel in Stateline, Nevada, United States. After an attempt to disar ...

Loan shark

A loan shark is a person who offers loans at extremely high interest rates, has strict terms of collection upon failure, and generally operates outside of local authority. Loan sharking is usually illegal, but predatory lending with extremely hig ...

Mosman bomb hoax

The Mosman bomb hoax took place in the Lower North Shore Sydney suburb of Mosman, New South Wales, Australia on 3 August 2011. An apparent collar bomb was placed around the neck of 18-year-old student Madeleine Pulver, by a balaclava-clad home in ...

Nuclear blackmail

Nuclear blackmail is a form of nuclear strategy in which an aggressor uses the threat of use of nuclear weapons to force an adversary to perform some action or make some concessions. It is a type of extortion, related to brinkmanship.

Nurbank murder case

The Nurbank bank, founded in Atyrau regional governors office was taken over by Rakhat Aliyev in January 2007. Shortly after, two Nurbank managers, Zholdas Timraliyev and Aybar Khasenov, were kidnapped, tortured and eventually killed by Aliyev. I ...

Phantom debt

Phantom debt or zombie debt is a debt that is old, defaulted, or not owed and is somehow haunting the presumed debtor. It generally refers to debt that is more than 3 years old, is long forgotten about or belonged to someone else – like someone w ...

Pizzo (mafia)

The pizzo is protection money paid to the Mafia often in the form of a forced transfer of money, resulting in extortion. The term is derived from the Sicilian pizzu. To let someone wet their beak is to pay protection money. The practice is widesp ...

Refugee kidnappings in Sinai

Between 2009 and 2014, there were large numbers of refugees who were kidnapped and held in Sinai. Refugees from various countries were transported to Sinai and held hostage by members of Bedouin tribes. Typically, the hostages were forced to give ...

Revolutionary tax

Revolutionary tax is a major form of funding for violent non-state actors such as guerrilla and terrorist organizations. Those outside the organization may consider it to be a euphemism for "protection money." Proponents of such groups maintain h ...

Shirini

Shirini -- which literally means" sweets” in Persian language and its Dari variant spoken in Afghanistan -- is the euphemism commonly used for bribes. In Afghanistan this has taken place under the Karzai administration. This can be attributed to ...

Tesco bomb campaign

The Tesco bomb campaign was an attempted extortion against British supermarket chain Tesco which started in Bournemouth, England, in August 2000 and led to one of the largest and most secretive operations ever undertaken by Dorset Police. During ...

Outline of forgery

The following outline is provided as an overview of and topical guide to forgery: Forgery – process of making, adapting, or imitating objects, statistics, or documents with the intent to deceive.

Admiralty Powers, &c. Act 1865

The Admiralty Powers, &c. Act was a British act of parliament passed in 1865. It gained royal assent on 6 July 1865. It is notable for its Section 5, which made the admiral-superintendent of every UK dockyard a justice of the peace "in all Pl ...

Archaeological forgery

Archaeological forgery is the manufacture of supposedly ancient items that are sold to the antiquities market and may even end up in the collections of museums. It is related to art forgery. A string of archaeological forgeries have usually follo ...

Blacksmith token

Blacksmith tokens are a form of evasion currency that was in circulation primarily in Lower Canada and Upper Canada along with neighboring areas, such as the northern parts of New York and New England in the mid-1820 to 1830s. They were not, stri ...

Catacomb saints

Catacomb saints were the bodies of ancient Christians that were carefully exhumed from the catacombs of Rome and sent abroad to serve as relics of certain saints from the 16th century to the 19th century. They were typically lavishly decorated wi ...

Copy-evident document

Copy-evident documents have features that make it detectable that a copy is not the original. In security printing various methods such as void pantograph are used to create patterns that are hard to copy exactly and when copied inexactly produce ...

Counterfeit electronic components

Counterfeit electronic components are electronic parts that are misrepresented as to their origins or quality. Counterfeiting of electronic components can infringe the legitimate producers trademark rights. Because counterfeit parts often have in ...

Epedigree

An epedigree is an electronic document which provides data on the history of a particular batch of a drug. It satisfies the requirement for a drug pedigree while using a convenient electronic form.

Forgery Act

Forgery Act is a stock short title used for legislation in the United Kingdom which relates to forgery and similar offences. The Bill for an Act with this short title may have been known as a Forgery Bill during its passage through Parliament.

Forgery Act 1830

The Forgery Act 1830 was an Act of the Parliament of the United Kingdom. It consolidated into one Act all legislation imposing the death penalty for forgery. Two years later the death penalty was abolished for most of these offences, and for the ...

Forgery Act 1837

The Forgery Act 1837 was an Act of the Parliament of the United Kingdom. It has been repealed. Section 1 abolished the death penalty for the offences mentioned in the preamble. It provided instead that a person convicted of any of those offences ...

Forgery Act 1861

The Forgery Act 1861 is an Act of the Parliament of the United Kingdom of Great Britain and Ireland. It consolidated provisions related to forgery from a number of earlier statutes into a single Act. For the most part these provisions were, accor ...

Forgery Act 1870

The Forgery Act 1870 is an Act of the Parliament of the United Kingdom. The whole Act, so far as unrepealed, was repealed by section 33 of, and Part I of Schedule 3 to, the Theft Act 1968. This Act was repealed for the Republic of Ireland by sect ...

Forgery Act 1913

The Forgery Act 1913 was an Act of the Parliament of the United Kingdom. This Act was repealed for England and Wales and Northern Ireland by section 30 of, and Part I of the Schedule to, the Forgery and Counterfeiting Act 1981. It was repealed fo ...

Forgery and Counterfeiting Act 1981

The Forgery and Counterfeiting Act 1981 is an Act of the Parliament of the United Kingdom which makes it illegal to make fake versions of many things, including legal documents, contracts, audio and visual recordings, and money of the United King ...

Forgery as covert operation

Forgery is used by some governments and non-state actors as a tool of covert operation, disinformation and black propaganda. Letters, currency, speeches, documents, and literature are all falsified as a means to subvert a government’s political, ...

Forgery of Foreign Bills Act 1803

The Forgery of Foreign Bills Act 1803 is an Act of the Parliament of the United Kingdom. Prior to its repeal in 2013, it created offences of forgery of foreign instruments in Scotland.

Forgery, Abolition of Punishment of Death Act 1832

The Forgery, Abolition of Punishment of Death Act 1832 was an Act of the Parliament of the United Kingdom of Great Britain and Ireland. It abolished the death penalty for all offences of forgery, except for forging wills and certain powers of att ...

Levels of identity security

The security features governing the security of an identity can be divided into three levels of security, i.e. Level 1 Security, Level 2 Security and Level 3 Security. The three levels of security, in combination, provide comprehensive security c ...

Lados Group

Lados Group, Bernese Group is a name given to a group of Polish diplomats and Jewish activists who during Second World War elaborated in Switzerland a system of illegal production of Latin American passports aimed at saving European Jews from Hol ...

Lottery fraud

Lottery fraud is any act committed to defraud a lottery game. A perpetrator attempts to win a jackpot prize through fraudulent means. The aim is to defraud the organisation running the lottery of money, or in the case of a stolen lottery ticket, ...

Photocopier

A photocopier is a machine that makes copies of documents and other visual images onto paper or plastic film quickly and cheaply. Most modern photocopiers use a technology called xerography, a dry process that uses electrostatic charges on a ligh ...

Security printing

Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity ca ...