Security culture: events, history, threats, regulations

The blog is devoted to the multiple issues of the security culture.

Страницы

Monday, November 21, 2016

Opinion

Former MI6 Chief: Trump could make Britain safer


President-Elect Donald Trump, joined on stage by running mate Mike Pence, speaks to supporters at the Election Night Party at the Hilton Midtown Hotel in New York City, NY, USA, on Wednesday, November 9, 2016. ©Van Tine Dennis/ABACA/ABACA USA/PA ImagesThere is no going back now, whatever the gainsayers may think. We are therefore entering a period of great uncertainty and profound change—but once the noxious atmosphere of the presidential campaign is dispersed and most of the uncertainties diminished through indications of new policies and appointments to the next administration, Trump may actually turn out to be good for the United Kingdom’s safety.
Trump’s primary populist agenda will be largely domestic, with the notable exception of trade with China. But I have it on good authority that, on his broader approach to foreign policy and national security, he wants and needs a close friend. Only two countries at the moment could possibly qualify for that role: the United Kingdom and Australia. Geography, together with the longstanding history of security co-operation, will comfortably allow both to be his best friends without much overlap.
So expect to see Churchill’s bust back in the Oval Office, Brexit Britain at the front of that trade negotiating queue and an increase in the number of cypher phones linking the staff of both nations’ National Security Councils. Forget the pivot to Asia and welcome back the spirit of Teddy Roosevelt, as Trump opts for higher defence spending.


Posted by Doronin at 8:48 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: Opinion

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About me

Doronin
View my complete profile

Headings

  • "Evidence" manufacturing (1)
  • "Lone wolf" threat (1)
  • "Not pleasant" moralist who deserted his whomper jawed wife (2)
  • 7:16) (1)
  • 70th Victory anniversory (1)
  • 75th anniversary (1)
  • 9/11 (2)
  • 9/11 attack (4)
  • 9/11 attacks (2)
  • 9/11 catasrophe in Mecca (1)
  • 9/11 collapse in Mecca: act of God or negligence (1)
  • 9/11 congressional inquiry report (1)
  • 9/11 investigation (17)
  • 9/11 papers (1)
  • 9/11 secrets (2)
  • 9|11 investigation (1)
  • A lone voice in the wilderness (1)
  • A seat of tention (1)
  • A&M security (1)
  • Abuse of children (1)
  • Abuse of power (1)
  • Academia (1)
  • Accused of spying (1)
  • Acqusition strategy (1)
  • Act of God (1)
  • Act of terror (1)
  • Acting against Gestapo & SS (1)
  • Acting as adult (1)
  • Addicts protest (1)
  • Adios muchachos (1)
  • Aerial defense (3)
  • Aerial security (3)
  • Aerial surveillance (1)
  • Aerospace (199)
  • Afghan war (10)
  • Afghanistan (10)
  • Afghanistan war (6)
  • Afghanistan's war (1)
  • After disaster (1)
  • Agent security (1)
  • Agents exposed (1)
  • Agents punishments (1)
  • Agents recruitment (1)
  • Agents remuneration (1)
  • AI security (16)
  • Aiport security (1)
  • Air & missile defense (2)
  • Air defense (37)
  • Air force (2)
  • Air force science and technology (1)
  • Air space security (1)
  • Airflights & cybersecurity (1)
  • Airport security (78)
  • Airports security (1)
  • Airpotrs security (1)
  • Airspace (1)
  • Aliens (1)
  • All the king's men (1)
  • Ambiguous warfare (1)
  • American business v. American bureaucracy (1)
  • Americas (1)
  • AML (13)
  • AML investigation (1)
  • Analytic tradecraft standards (1)
  • and West Takes Notice (1)
  • Animal cruelty (1)
  • Animal security (2)
  • Animals security (2)
  • anonymity and digital freedom (1)
  • Anti-constitution threat (1)
  • Anti-Islam protests (1)
  • Anti-missile defense (2)
  • Anti-money laundering (1)
  • Anti-Semitism (1)
  • Anti-terror (1)
  • Anti-terror consolidation (1)
  • Anticipatory intel (1)
  • Antiqities security (1)
  • Antiquities security (3)
  • Antiquities smuggling (1)
  • Antiquities Trafficking (2)
  • Arctic (28)
  • Armas (1)
  • Arms control (7)
  • Arms export (1)
  • Arms production & trade (2)
  • Arms race (14)
  • Arms race "baby" (1)
  • Arms smuggling (14)
  • Arms trade (111)
  • Arms trafficking (6)
  • Army (1)
  • Art safety (1)
  • Art security (4)
  • Art trafficking (1)
  • Artefact security (1)
  • Artefacts smuggling (1)
  • Artifacts trafficking (1)
  • Artificial intelligence (7)
  • Artificial intelligence arms race (1)
  • Artificial intelligence security (5)
  • Artificial intelligence threat (1)
  • Asia Pacific (5)
  • Asia-Pacific (19)
  • Asian-Pacific (4)
  • Asian-Pacific security (1)
  • Assassination (1)
  • Assassination of President (1)
  • Assassination plots (2)
  • Assassination scenario (1)
  • Assassinations (1)
  • Assessing China (1)
  • Asset forfeiture (1)
  • Asteroid security (16)
  • Asteroid securiy (1)
  • Asteroids security (1)
  • Atom spy (1)
  • Atomic espionage (1)
  • Atomic spy (1)
  • Attack in Norway (1)
  • Auto production & sales (1)
  • Aviation & cybersecurity (1)
  • Aviation infrastructure security (1)
  • Aviation safety (1)
  • Aviation security (5)
  • Background check (2)
  • Background checks (3)
  • Background investigations (2)
  • Bad intelligence v. good politicians (1)
  • Bad sign (1)
  • Ballistic missile defense system (1)
  • Banking secrecy (1)
  • Barbarism (1)
  • Bay of Pigs invasion history (1)
  • Benghazi investigation. (1)
  • Bestiality production (1)
  • Betrayal (1)
  • Biden's massage (1)
  • Bio & cnem security (1)
  • Biodefense (4)
  • Biological & chemical security (1)
  • Biological warfare (1)
  • Biometric authentication (1)
  • Biometric security (2)
  • Biometrics (4)
  • Biosecurity (366)
  • Blasts investigation (1)
  • Blogging (1)
  • BND (1)
  • Bolek files (2)
  • Border control (3)
  • Border security (223)
  • Bounty (1)
  • Brasil's election (2)
  • Brexing & intel (1)
  • Brexit (10)
  • Brexit impact (2)
  • Brexit implication (2)
  • Bribery (1)
  • British election results (1)
  • British elections (6)
  • Broadcasting (1)
  • Brothers threatened (1)
  • Brutal security practice (1)
  • Brute? (1)
  • Bulk data collection (1)
  • Busines security (1)
  • Business security (42)
  • Business v. sovereign nations (1)
  • C.I.S. (1)
  • C4I capabilities (1)
  • Can the leopard change his spots? (1)
  • Capital panishment (5)
  • Capital punishment (23)
  • Capital punishment of innocent (1)
  • Capitalists chemical threat (1)
  • Car security (8)
  • Casus belli (1)
  • Cause and effect (1)
  • CBRN attack threat (1)
  • CBRN security (1)
  • CBRNE security (1)
  • Censorship (1)
  • Central Asia (1)
  • Chasing conspirators (1)
  • Cheap humour (1)
  • Checkpoint security (1)
  • Chelsea Manning (1)
  • Chelsea's brethren (1)
  • Chemical & biosecurity (1)
  • Chemical security (1)
  • Chemical & biological security (1)
  • Chemical & biological warfare (1)
  • Chemical & biosecurity (1)
  • Chemical and biological security (1)
  • Chemical security (203)
  • Cherchez la femme (1)
  • Child smuggling (1)
  • Children security (1)
  • China (2)
  • China's security sector (1)
  • CIS (1)
  • Citizenship (3)
  • Citizenship security (1)
  • Civil defense (7)
  • Civil liberties security (1)
  • Civil preparedness (2)
  • Civil protection (2)
  • Civil society (1)
  • Civilian & military management (1)
  • Civilian v. military (1)
  • Classification (1)
  • Classification & release (1)
  • Clean water security (1)
  • Clemency (1)
  • Climate & economic security (1)
  • Climate security (286)
  • Climate security. (1)
  • Climate security/ (1)
  • Climater security (1)
  • Climte security (1)
  • Clinate security (1)
  • Clintonites' atrocity (1)
  • Close quarters combat (1)
  • Code breaking (1)
  • Codebreaking (1)
  • Cold war (1)
  • Cold war history (13)
  • Cold war spying (1)
  • Color revolution (1)
  • Color revolutions (1)
  • Combat electronics (1)
  • Combat training (2)
  • Combatind terrorism and violent extremism is a top priority (1)
  • Combating corruption (8)
  • Combating corruption in customs (1)
  • Combating crime (2)
  • Combating drug abuse (1)
  • Combating drug trafficking (7)
  • Combating extremism (8)
  • Combating human trafficking (1)
  • Combating insurgency (1)
  • Combating nuclear smuggling (1)
  • Combating terror (2)
  • Combating Terror Financing (1)
  • Combating terror propaganda (1)
  • Combating terrorism (1)
  • Combating vehicle bombs (1)
  • Coming to the roots (1)
  • Communication security (112)
  • Communication surveillance (1)
  • Communications (1)
  • Communications security (53)
  • Competition (1)
  • Competition law & practice (1)
  • Competition security (1)
  • Compromising material (1)
  • Concepts & opinions (4)
  • Confession (1)
  • Confession of spy (2)
  • Confessions of spy (4)
  • Confidential informants (1)
  • Conflict of interest (1)
  • Confusing national security and own political destiny (1)
  • Congressional oversight of special services (1)
  • Congressional investigation (1)
  • Congressional oversight (3)
  • Conservative viewpoint (1)
  • Conspiracies (1)
  • Conspiracy (1)
  • Conspiracy & theft (1)
  • Conspiracy exposure (1)
  • Conspiracy of grey blurs (1)
  • Conspiracy theories (12)
  • Conspiracy theory (15)
  • Conspiration theories (1)
  • Consumer safety (3)
  • Consumer safety. (1)
  • Consumer security (8)
  • Consumers security (1)
  • Conterterrorism (1)
  • Contraband smuggling (1)
  • Corporal punishment (2)
  • Correction (1)
  • Correction security (1)
  • Correctional facilities (1)
  • Corruption (368)
  • Corruption & border security (1)
  • Corruption & defense (1)
  • Corruption & human trafficking (1)
  • Corruption & Iraqi war (1)
  • Corruption & military (1)
  • Corruption & space (1)
  • Corruption & sport (2)
  • Corruption & sport & politics (2)
  • Corruption Central (1)
  • Corruptiona & space (1)
  • Coruuption (1)
  • Costly political mistakes (1)
  • Counter-terror fair (1)
  • Counter-terror law (2)
  • Counter-terrorism (1)
  • Counter-terrorism laws (1)
  • Counterinelligence (1)
  • Counterintelligence (16)
  • Counterproliferation (1)
  • Counterterorism (1)
  • Counterterrorism (95)
  • Counterterrorism legislation (1)
  • Coup (2)
  • Coup & warfare (1)
  • Coup attempt (1)
  • Coup history (1)
  • Court decision (1)
  • Cover-up (3)
  • Covert action (2)
  • Covert actions (3)
  • Covert operations (1)
  • Covert ops (2)
  • Cporruption (1)
  • Creams of society in child abuse (1)
  • Crime (44)
  • Crime & punishment (1)
  • Crime & punishment (1)
  • Crime prevention (3)
  • Crime scene details (1)
  • Crimea (1)
  • Crimes (1)
  • Criminal charge (1)
  • Criminal deportation (1)
  • Criminal intelligence (1)
  • Criminal invesigation (1)
  • Criminal investigation (204)
  • Criminal invetigation (1)
  • Criminal justice (3)
  • Criminal profiling (1)
  • Criminal prosecution/ (1)
  • Criminal sentence (1)
  • Criminal story (1)
  • Criminals employ old intel methods (1)
  • Criminology (7)
  • Cross-border justice (1)
  • Cross-border tax avoidance (1)
  • Crowdfunding (1)
  • Cryptography (3)
  • Cubersecurity (2)
  • Culture security (1)
  • Curious spy (1)
  • Currency smuggling (2)
  • Customer security (1)
  • Customers security (2)
  • Customers' security (1)
  • Customs intelligence (1)
  • Cyber culture (1)
  • Cyber strategy (1)
  • Cyber threat intel (1)
  • Cyber wars (7)
  • Cyberscurity (1)
  • Cybersecurity (865)
  • Cybersecurity & oil transportation (1)
  • Cybersecurity law (1)
  • Cyberseurity (2)
  • Cyberwar (3)
  • Cyberwarfare (2)
  • Cyberwars (33)
  • Czech's election (1)
  • Dam safety (1)
  • Dam security (5)
  • Dangerous conspiracy theories (1)
  • Dangerous neighbour (1)
  • Dangerous pleasure (1)
  • Dangerous profession (1)
  • Dangerous roads (1)
  • Dangerous secrets (1)
  • Data breach (1)
  • Data collection (1)
  • Data privacy security (1)
  • Data protection (1)
  • Data security (19)
  • Data sharing (1)
  • Deadly attack (1)
  • Death of agent (1)
  • Decapitation (2)
  • Decassification (1)
  • Deception (3)
  • Declassification (40)
  • Declassification & release (2)
  • Declassified (3)
  • Decryption (1)
  • Deep state (6)
  • Defence (1)
  • Defence spending (1)
  • Defense (117)
  • Defense electronics (1)
  • Defense industry (4)
  • Defense manufacturing (1)
  • Defense procurement (32)
  • Defense review report rebuked (1)
  • Defense spending (39)
  • Dementia symptom (1)
  • Democracy (1)
  • Democracy security (1)
  • Demographic security (15)
  • Demography (1)
  • Desalination (1)
  • Desinformation (1)
  • Despite state immunity (1)
  • Devil-ridden politicians (1)
  • DHS v. POTUS (1)
  • DIA (1)
  • DIA report (1)
  • Dictator's crime (1)
  • Dictatorship crimes (1)
  • Did brother Obama bless brother Erdogan to shot down Russian plane? (1)
  • Digital HUMINT (1)
  • Diplomat security (1)
  • Diplomat's security (1)
  • Diplomatic immunity v. local law (1)
  • Diplomatic security (5)
  • Diplomats security (1)
  • Diplomats' safety (1)
  • Diplomats' security (1)
  • Directed energy (13)
  • Directed energy systems (2)
  • Directed energy weapons (2)
  • Discipline (1)
  • Discovery (1)
  • Disinformation horse dose (1)
  • Dogs of war (5)
  • Domestic intel (2)
  • Domestic intel gathering (1)
  • Don't trouble trouble till trouble troubles you (1)
  • Doomsday (1)
  • Double agent's revelations (1)
  • Drag trafficking (1)
  • Drills (33)
  • Drone papers (4)
  • Drones (130)
  • Drones/ (1)
  • Drug smuggling (1)
  • Drug trafficking (1)
  • Drug & human trafficking (1)
  • Drug offense (1)
  • Drug smuggling (137)
  • Drug tafficking (1)
  • Drug trafficking (132)
  • Drug trafficking & corruption (1)
  • Drug trrafficking (1)
  • Dum security (1)
  • Dutch elections (18)
  • Duty to warn (1)
  • Earthquake security (2)
  • Ecological security (1)
  • Economic & international security (1)
  • Economic espionage (1)
  • Economic secirity (1)
  • Economic security (359)
  • Economics (1)
  • Economics of war (1)
  • Econonic security (1)
  • Education (3)
  • Education security (12)
  • Eectoral battles (1)
  • Election battles (7)
  • Election polls (1)
  • Election predictions (1)
  • Election procedure (1)
  • Election result (2)
  • Election results (13)
  • Election safety (1)
  • Election security (202)
  • Elections 2017 (1)
  • Elections forecasts (1)
  • Elections in Europe (1)
  • Elections in France (2)
  • Elections in Germany (2)
  • Elections in Italy (1)
  • Elections results (6)
  • Elections security (1)
  • Electonic surveillance (3)
  • Electoral battles (1)
  • Electoral battles (141)
  • Electoral campaign (1)
  • Electoral security (52)
  • Electric grid security (1)
  • Electro-magnetic pulse (1)
  • Electromagnetic pulse (1)
  • Electromagnetic safety (1)
  • Electromagnetic security (5)
  • Electronic security M & A (1)
  • Electronic survaillance (1)
  • Electronic surveiilance (4)
  • Electronic surveillance (337)
  • Electronic surveillsnce (1)
  • Electronic surveollance (1)
  • Electronic syrveiilance (1)
  • Electronic warfare (89)
  • Elewctronic warfare (1)
  • ELINT (1)
  • Elites' fear (5)
  • Embargo (1)
  • Emergency preparedness (5)
  • Emergency response (1)
  • Emerging markets risks (1)
  • EMP (7)
  • EMP security (29)
  • EMP threat (11)
  • Employment security (1)
  • EMS (1)
  • Encryption (51)
  • Energy (1)
  • Energy security (146)
  • Energy transport security (1)
  • Enigma (1)
  • Entertainment security (1)
  • Environment security (4)
  • Environmental security (1)
  • Environmental & defense security (1)
  • Environmental securitu (1)
  • Environmental security (101)
  • Environmetal security (1)
  • ESP (2)
  • ESP & criminal investigation (1)
  • ESP & national security (4)
  • ESP security (1)
  • Espionage (61)
  • Espionage history (1)
  • Et tu (1)
  • Ethics safety (1)
  • EU election (1)
  • EU elections (8)
  • EU intel (1)
  • EU security (1)
  • Eugenics (1)
  • Eurasia (1)
  • Europe (1)
  • European elections (2)
  • European hub for Chinese companies (1)
  • European security (45)
  • Europol (1)
  • Eurupean security (1)
  • Everyone does it (1)
  • Ex-spy chief opinion (2)
  • Ex-spy confessions (1)
  • Executions (2)
  • Exploration security (1)
  • Export control (8)
  • Export security (4)
  • Export/import security (1)
  • Exposing the mole (1)
  • Exremism (1)
  • External security (1)
  • Extradition (2)
  • Extrasensory perception (2)
  • Extremism (66)
  • Extremism & its proponents (1)
  • Extremism prevention (1)
  • Extremists threat (1)
  • Face recognition (1)
  • Facial recognition (10)
  • Failed coup (27)
  • Faith (1)
  • Fake dossier (1)
  • Fake news (2)
  • Fake spy (1)
  • Faker leads the coup (1)
  • False flag operation (1)
  • False flag operations (1)
  • False flag ops (2)
  • Far East (1)
  • Fatal date (1)
  • Fate of whistleblower (1)
  • Fear of terror (1)
  • Fears & doubts (1)
  • Fears of global competition (1)
  • Fianancial safety (1)
  • Fiancial safety (2)
  • FIFA corruption (1)
  • FIFA scandal (1)
  • Fighting "Spectre" (1)
  • Fighting corruption (2)
  • Fighting extremism (2)
  • Fighting sex crime (1)
  • Finacial safety (7)
  • Finance safety (1)
  • Finance security (1)
  • Financial crime (2)
  • Financial safety (167)
  • Financial security (21)
  • Finding new storage facilities (1)
  • Finding the roots of defeat (2)
  • Fine arts security (1)
  • Finland's election (2)
  • Fire prevention (1)
  • Fire safety (18)
  • Fire sarfety (1)
  • Fire security (1)
  • Firearms smuggling (1)
  • First aid kit (1)
  • First Putin's blow (1)
  • Flight continues (1)
  • Flight security (70)
  • Flights security (41)
  • FOIA (1)
  • Follow money (2)
  • Follow the money (23)
  • Food safety (4)
  • Food security (43)
  • Food smuggling (2)
  • Food supply security (1)
  • Forecast (3)
  • Forecasting (8)
  • Forecasting & prediction (1)
  • Forecasts (2)
  • Foreign affairs (53)
  • Foreign agents (2)
  • Foreign direct investments security (1)
  • Foreign investment risk security (1)
  • Foreign investment security (6)
  • Foreign policy (40)
  • Foreign policy security (2)
  • Foreign relations (2)
  • Foreign trade (7)
  • Foreign trade safety (2)
  • Foreign trade security (8)
  • Foreing trade security (1)
  • Forensic (1)
  • Forensic evidence (1)
  • Forensic intelligence (1)
  • Forensic psychology (1)
  • Forensics (180)
  • Former CIA Director opinion (2)
  • Former spy chief opinion (1)
  • Fraud (11)
  • Free media security (5)
  • Free press security (1)
  • Free speech security (1)
  • Freedom of information (3)
  • Freedom of Information Act request (1)
  • Freedom of press (1)
  • Freemasonry (1)
  • French elections (18)
  • Friend in need is a friend indeed (1)
  • Fuel smuggling (1)
  • Gambling (1)
  • Games security (1)
  • Gas smuggling (1)
  • Gays are coming (1)
  • Genealogy & politics (1)
  • Generals are coming (1)
  • Genetic security (1)
  • Genicide (1)
  • Genocide (6)
  • Geoengineering (13)
  • Geoengineering: 'Plan B' for the planet amid climate emergency (1)
  • Geography (1)
  • GEOINT (4)
  • Geolocation (1)
  • Geomagnetic security (6)
  • Geopolitics (4)
  • Geospacial intel (1)
  • German elections (8)
  • Global positioning security (1)
  • Global security (3)
  • Global trafficking streams (1)
  • Global warming (1)
  • Globalism (1)
  • Globalization (3)
  • Gold smuggling (10)
  • Government spending security (1)
  • Government surveillance (1)
  • Governments secrecy (1)
  • Grand corruption (2)
  • Growth of population (1)
  • Guerilla war (1)
  • Gun contol (1)
  • Gun control (67)
  • Gun trafficking (1)
  • Gun violance (1)
  • Gun violence prevention (1)
  • Guns & schools (1)
  • H&R (1)
  • Hate crime (1)
  • Hazing (1)
  • Head of intel (3)
  • Healrh security (1)
  • Health & cybersecurity (1)
  • Health & energy security (2)
  • Health & politics (1)
  • Health security (440)
  • Health security Health security Health security Health security (1)
  • Healthcare procurement security (1)
  • Healthcare security (2)
  • Heath security (1)
  • Hictory (1)
  • Hidden Nazi treasury (1)
  • Hidden treasure (3)
  • Hidden treasure discovery (1)
  • Hidden treasury (9)
  • Hidden WW2 treasure (1)
  • Hiding place (1)
  • High treason (6)
  • History (1)
  • History of mass surrveillance (1)
  • Holidays safety (1)
  • Home security (1)
  • Homeland security (47)
  • Homeland security market (2)
  • Honest man (1)
  • Honey trap (1)
  • Honey traps (1)
  • Honeypot trap (1)
  • Hot topic (1)
  • How many chalabis are at service now? (1)
  • HR security (2)
  • Human organ trafficking (1)
  • Human organs trafficking (1)
  • Human right security (1)
  • Human rights (2)
  • Human rights security (8)
  • Human rights violations (1)
  • Human security (1)
  • Human smuggling (15)
  • Human subjects safety (2)
  • Human trafficking (91)
  • HUMINT (2)
  • Hunan trafficking (1)
  • Hunt for human rights violators (1)
  • Hunter skills (1)
  • Hunting for terrorists (2)
  • Hybrid warfare (1)
  • Hygiene security (1)
  • Hypersonics (17)
  • Hypnosis in law practice (1)
  • IC head (1)
  • Identity theft (1)
  • IED threat (1)
  • Illegal business (1)
  • Illegal exports (1)
  • Illegal lobbying (1)
  • Illegal oil trade (1)
  • Illegal weapons supply chain (1)
  • Illegal weapons trafficking (1)
  • Illicit transfers (1)
  • Immigration (10)
  • Immigration security (351)
  • Immigration sesurity (1)
  • Impeachment (7)
  • Imperial family murder investigation (1)
  • In spy nets (1)
  • In waiting for a white knight (1)
  • Inauguration security (4)
  • Incident (1)
  • Increased honey traps arsenal (1)
  • Increasing intel resources (1)
  • Independence security (1)
  • Independent investigation (1)
  • Indian election (1)
  • Industrial safety (1)
  • Industrial security (3)
  • Inernational cooperation (1)
  • Infantry Weapons (2)
  • Informants oversight (1)
  • Information declassification & release (2)
  • Information ops (1)
  • Information security (290)
  • Information war (1)
  • Information warfare (5)
  • Infowars (7)
  • Infrasrtucture security (1)
  • Infrastructure security (1)
  • Infrastructure security (12)
  • Infromation security (3)
  • Innovatioins & technologies (1)
  • Innovation & technologies (1)
  • Innovation & technology (11)
  • Innovation in defense (1)
  • Innovationa & technologies (2)
  • Innovations & technologies (7)
  • Innovations & security (1)
  • Innovations & technilogies (1)
  • Innovations & technjlogies (1)
  • Innovations & technolog (1)
  • Innovations & technologies (320)
  • Innovations & technology (14)
  • Innovations & terchnologies (1)
  • Innovations and technologies (1)
  • Innovatuions & technologies (1)
  • Inquiry (1)
  • Inside job (1)
  • Insider threat (1)
  • Insider threats (1)
  • Insider trading (2)
  • Institutions are being captured by elites (1)
  • Intel (3)
  • Intel composure (1)
  • Intel & business (1)
  • Intel & love (1)
  • Intel & politics (5)
  • Intel & religion (1)
  • Intel advice (1)
  • Intel altering (1)
  • Intel analyses (1)
  • Intel analysis (2)
  • Intel analysts revolt (1)
  • Intel analytics (4)
  • Intel architecture (1)
  • Intel argot (1)
  • Intel assessment (13)
  • Intel assets (1)
  • Intel barter deal (1)
  • Intel breafing (2)
  • Intel briefing (17)
  • Intel briefings (1)
  • Intel career (1)
  • Intel change (1)
  • Intel chief (6)
  • Intel chief dismissal (1)
  • Intel chief post (1)
  • Intel chief views (1)
  • Intel classification rules (1)
  • Intel cloud (2)
  • Intel collection (5)
  • Intel comments (1)
  • Intel community (1)
  • Intel competence (1)
  • Intel concerns (1)
  • Intel conflict (1)
  • Intel cooperation (13)
  • Intel culture (1)
  • Intel diplomatic cover (1)
  • Intel diversity (1)
  • Intel doctoring (1)
  • Intel dogs (1)
  • Intel domestic ops (1)
  • Intel dread (1)
  • Intel engagement (1)
  • Intel enormous success (1)
  • Intel entertainment (2)
  • Intel entertinment (1)
  • Intel environment (1)
  • Intel ethical core (1)
  • Intel ethos and practice (1)
  • Intel exchange (1)
  • Intel expansion (1)
  • Intel experience (1)
  • Intel failure (16)
  • Intel failures (2)
  • Intel fault (1)
  • Intel flaws (1)
  • Intel footprint (1)
  • Intel forecasts failed (1)
  • Intel funding (1)
  • Intel gathering (100)
  • Intel gatheruing (2)
  • Intel head (3)
  • Intel history (11)
  • Intel HQ's (1)
  • Intel HR (2)
  • Intel hub (1)
  • Intel human capital (1)
  • Intel identity (1)
  • Intel impovement (1)
  • Intel improvement (1)
  • Intel in complex world (1)
  • Intel in politics (1)
  • Intel in unstable world (1)
  • Intel industry (1)
  • Intel innovations (1)
  • Intel inside account (1)
  • Intel involvement (1)
  • Intel journal (1)
  • Intel law (2)
  • Intel leakage (1)
  • Intel learning (1)
  • Intel loopholes (1)
  • Intel loss (1)
  • Intel management (2)
  • Intel manipulation (4)
  • Intel methods (1)
  • Intel models (1)
  • Intel monitoring (1)
  • Intel nature (1)
  • Intel opinion (1)
  • Intel ops (3)
  • Intel ops history (1)
  • Intel oversight (16)
  • Intel PAR (1)
  • Intel policy (1)
  • Intel politicising (1)
  • Intel politicization (4)
  • Intel politicizing (1)
  • Intel prediction (1)
  • Intel prejudice (1)
  • Intel priorities (1)
  • Intel procurement (1)
  • Intel products (1)
  • Intel promotion (1)
  • Intel publishing (1)
  • Intel rainbow (1)
  • Intel re-structuring (1)
  • Intel reception (1)
  • Intel recruiting (7)
  • Intel recruitment (14)
  • Intel reform (8)
  • Intel reformed (1)
  • Intel regulations (1)
  • Intel reorganization (3)
  • Intel report (3)
  • Intel reporting (1)
  • Intel reports (5)
  • Intel reports altering (1)
  • Intel resource shortages (1)
  • Intel restructuring (1)
  • Intel revelations (2)
  • Intel revenge (1)
  • Intel review (2)
  • Intel risky ops (1)
  • Intel rules (1)
  • Intel searching (1)
  • Intel secrets (1)
  • Intel security (1)
  • Intel sex harassment (1)
  • Intel share (1)
  • Intel sharing (24)
  • Intel software (1)
  • Intel spending (1)
  • Intel statement (1)
  • Intel story (1)
  • Intel supervision (1)
  • Intel support (1)
  • Intel target (1)
  • Intel targets (1)
  • Intel task (1)
  • Intel tipp-off (1)
  • Intel to unite (1)
  • Intel tolerance (1)
  • Intel training (1)
  • Intel transparency (3)
  • Intel unmasking (1)
  • Intel v. congressional scrutiny (1)
  • Intel v. fake news (1)
  • Intel v. intel (2)
  • Intel value (1)
  • Intel war (1)
  • Intel warned (2)
  • Intel warning (28)
  • Intel warnings (2)
  • Intel warns (1)
  • Intel wars (2)
  • Intel way out (1)
  • Intel Wiki (1)
  • Intel woes (1)
  • Intel work (1)
  • Intel workforce (1)
  • Intel world (3)
  • Intellectual property security (3)
  • Intelligence (23)
  • Intelligence community (1)
  • Intelligence assessment (1)
  • Intelligence community (2)
  • Intelligence deception (1)
  • Intenational security (1)
  • Intentaional security (1)
  • Interception (2)
  • Intermational security (1)
  • Internal security (5)
  • Internatioal security (1)
  • International affairs (4)
  • International cooperation (47)
  • International drug trade & money-laundering (1)
  • International identity (1)
  • International law security (1)
  • International military cooperation (1)
  • International secrity (1)
  • International securitu (1)
  • International security (726)
  • International seurity (1)
  • International trade (2)
  • Internet access (1)
  • Internet of Things security (1)
  • Internet security (13)
  • Interrnational security (1)
  • Intrernational security (1)
  • Intuition (2)
  • Investigation (2)
  • Investigation results (1)
  • Investigative journalism (1)
  • Investigative report (1)
  • Investigative reports (3)
  • Investment safety (1)
  • Iran (1)
  • Iran's elections (1)
  • Iranian elections (1)
  • Iraqi war (17)
  • Is it the time to set up international investigation group? (1)
  • It is easy to guess who would # 1 in that database (1)
  • Italy elections (1)
  • James Mattis warning (1)
  • JFK assasination (2)
  • Journalism security (3)
  • Journalists security (1)
  • Judge opinion (1)
  • Judiciary (3)
  • Judiciary security (1)
  • Judiciary security (1)
  • Justice (2)
  • Killer robots (1)
  • King's erratic behaviour (1)
  • Korea (95)
  • Labor safety (1)
  • Labor security (1)
  • Labour security (1)
  • Lack of funds control (1)
  • Lame duck heritage (1)
  • Land mines (1)
  • Laser (54)
  • Lasers (1)
  • Last spit from the lame duck (1)
  • Last tricks of the lame duck (1)
  • Late revelations (1)
  • Law enforcement (1)
  • Law & national security (1)
  • Law & order (87)
  • Law & politics (1)
  • Law & war (1)
  • Law and order (1)
  • Law e nforcement (1)
  • Law enfoecement (2)
  • Law enforcement (129)
  • Law enforcement security (1)
  • Lawsuit (1)
  • Leadrship intel analysis (1)
  • Leak (1)
  • Lebanon elections (1)
  • Legal (3)
  • Legal aid (1)
  • Legal battles (3)
  • Legal investigation (1)
  • Legal security (3)
  • Legalization of marijuana (1)
  • Legislature (2)
  • Lenin in siege (1)
  • Lenin is doomed (1)
  • Lenin's deed (1)
  • Lenin's revenge (1)
  • Libertarians v. hawks (1)
  • Libya (2)
  • Libya knot (1)
  • Lone wolf (1)
  • Long life of laptops (1)
  • Looking for Western legal standards (1)
  • Lost secrets (3)
  • Lost secrets? (1)
  • Lunch security (1)
  • Lybia (2)
  • M &A security (1)
  • M&A (2)
  • M&A security (5)
  • Magnetism (1)
  • Mail cover surveillance (1)
  • Mail security (1)
  • Main battle tanks (1)
  • Main threat (1)
  • Managing global firm risks (1)
  • Manhattan project (1)
  • MANPADS (1)
  • Mapping & location (1)
  • Maps (2)
  • Marasmus grows stronger (1)
  • Marine security (4)
  • Marital security (1)
  • Maritime safety (7)
  • Maritime security (21)
  • Marriage security (1)
  • Mass media (2)
  • Mass media security (8)
  • Mass shooting (4)
  • Mass shootings (1)
  • Mass shouting (1)
  • Mass surveillance (79)
  • Mass surveillanse (1)
  • Maternity security (1)
  • Mecca security (1)
  • Media (1)
  • Media freedom (1)
  • Media safety (1)
  • Media security (1)
  • Medieval ally (1)
  • Meeting global security demands (1)
  • Memorial Day (1)
  • Mercenaries (1)
  • Mercenary industry (5)
  • Methods of profiling (1)
  • MH17 tragedy (1)
  • MI5 files (1)
  • MI6 (1)
  • Microwave weapon (1)
  • Middel East (1)
  • Middle East (287)
  • Middlw East (1)
  • Migration (1)
  • Military (344)
  • Military & Eastern Europe (1)
  • Military & intelligence (1)
  • Military & law (2)
  • Military & politics (1)
  • Military aid (1)
  • Military bases (1)
  • Military bases abroad (1)
  • Military conflict (1)
  • Military cooperation (1)
  • Military deception (1)
  • Military doctrine (1)
  • Military history (1)
  • Military HR (1)
  • Military industrial complex (6)
  • Military industry (1)
  • Military infrastructure security (1)
  • Military innovation & technology (3)
  • Military innovations & technology (2)
  • Military intelligence (1)
  • Military intelligence complex (1)
  • Military IT (1)
  • Military offence (1)
  • Military personnel (1)
  • Military procurement (13)
  • Military production (4)
  • Military protection (1)
  • Military recruitment (1)
  • Military religious freedom security (1)
  • Military reserve (1)
  • Military space operations (1)
  • Military spending (52)
  • Military startegy (1)
  • Military strategy (4)
  • Military strategy v. grand strategy (1)
  • Military technology (1)
  • Military training (1)
  • Military triumph (1)
  • Military-industrial complex (1)
  • Military-to-military communications (1)
  • Militry procurement (1)
  • Miltary innovation & technology (1)
  • Mind control (14)
  • Mind control history (1)
  • Mine clearing (1)
  • Mining security (1)
  • Misinformation (2)
  • Missile defence (1)
  • Missile defense (81)
  • Missile threat (1)
  • Mission statement (1)
  • Misterious death (1)
  • Mob wars (2)
  • Modern warfare (27)
  • Modus operandi (3)
  • Mole in action (1)
  • Moles (3)
  • Money laundering (11)
  • Money smuggling (1)
  • Morality security (1)
  • Moscow experiment (1)
  • MPs security (1)
  • Mysterious birdhouse (1)
  • Mysterious Bolek (1)
  • Mysterious cache (1)
  • Mysterious death (1)
  • Mysterious death in Mecca of security (1)
  • N. Korea (2)
  • N.Korea (2)
  • National emergency (1)
  • National guard (3)
  • National intelligence startegy (1)
  • National interests (3)
  • National interests v. adventurism (1)
  • National military strategy (2)
  • National security (196)
  • National security & politics (1)
  • National security & steel (1)
  • National security argot (1)
  • National security culture (1)
  • National security discussed (1)
  • National security education (2)
  • National security issue (1)
  • National security law (19)
  • National security laws (33)
  • National security risks (1)
  • National security spending (1)
  • National security startegy (1)
  • National security state (1)
  • National security strategy (8)
  • National security tasks (1)
  • National security threat (15)
  • National security threats (19)
  • National security voice (1)
  • NATO (5)
  • Natural disasters (1)
  • Naval history (1)
  • Naval intel (2)
  • Naval security (1)
  • Navigation security (26)
  • Navy (236)
  • Nazi atrocoties (1)
  • Nazi threat (6)
  • Neuroscience (6)
  • Neurosecurity (1)
  • New Anti-Aircraft System Introduced (1)
  • New name for old content (1)
  • New national security law (1)
  • New Russian revolutionist in Swiss (1)
  • New weapons (1)
  • New Year Eve (1)
  • Next subjects for Obama's sanctions (1)
  • NGO (1)
  • NGOs (2)
  • NGOs v. national security (1)
  • Nonprofits security (1)
  • North Africa (1)
  • Norway probe (1)
  • Nothing in common (1)
  • Nuclea security (1)
  • Nuclear disarmament (1)
  • Nuclear forensics (1)
  • Nuclear science history (1)
  • Nuclear security (940)
  • Nuclear security anniversary (1)
  • Nuclear smuggling (27)
  • Nuclear trafficking (3)
  • Nuclear transport security (1)
  • Nuclear weapons (2)
  • Nuclerar security (1)
  • Nuslear security (1)
  • Nuvlear security (1)
  • Obscenity (1)
  • Oil and gas operations security (1)
  • Oil smuggling (2)
  • Oil wars (1)
  • Old widespread intel tradition (1)
  • Old wounds pain (1)
  • On-board manufacturitng (1)
  • One point of view (1)
  • Open Skies (1)
  • Open-source intelligence (2)
  • Operation Fox Hunt (1)
  • Opinion (104)
  • Opinion & viewpoint (3)
  • Organ smuggling (2)
  • Organ trafficking (9)
  • Organized crime (6)
  • Organized crime & terror threat (1)
  • Organs trafficking (1)
  • OSINT (5)
  • Outer space (153)
  • Outer space security (3)
  • Outerspace (21)
  • Oversight powers (1)
  • Paedophiles in power structures (1)
  • Paedophilia risks (1)
  • Paedophilia threat (1)
  • Panama papers (33)
  • Para investigations (1)
  • Parliamentary control (1)
  • Parliamentary oversight (1)
  • Past & future (1)
  • Patriotism v. globalism (2)
  • Peace pact (1)
  • Penitentiary (4)
  • Penitentiary security (6)
  • People smuggling (118)
  • Perceptual Studies (1)
  • Perimeter security (1)
  • Perimetric security (1)
  • Perjury (2)
  • Personal data security (47)
  • Personal security (50)
  • Personality (3)
  • Personality & red button (1)
  • Personnel Management (1)
  • Pet smuggling (1)
  • Petroleum smuggling (1)
  • Physics (2)
  • Plane crash (2)
  • Planetary defense (3)
  • Planetary security (1)
  • PM story (1)
  • Police officers security (1)
  • Policing (66)
  • Political assassination (3)
  • Political asylum (2)
  • Political landscape recofiguration (1)
  • Political landscape reconfiguration (1)
  • Political pranksters tactics (1)
  • Political victimology (1)
  • Political warfare (1)
  • Politicians electronic vulnerability (1)
  • Politicization of intelligence (1)
  • Politicized intel (3)
  • Politics (226)
  • Politics & innovations (1)
  • Politics & money (1)
  • Politics & national security (1)
  • Politics without mercy (1)
  • Poll reslts (1)
  • Poll results (123)
  • Poll results v. betting markets (1)
  • Pollard (1)
  • Polll results (1)
  • Polls (2)
  • Polls & predictions (1)
  • Polls results (1)
  • Pontifical secrecy (1)
  • Population security (1)
  • Populism (3)
  • Port security (9)
  • Post-election analysis (1)
  • Potential threats (1)
  • Poverty threat (1)
  • Power abuse (1)
  • Power grid security (51)
  • Pragmatism v. ideology (1)
  • Prediction (25)
  • Predictions (32)
  • Preventing future attacks (1)
  • PRISONERS OF THE INFORMATION WAR (1)
  • Prisoners swap (1)
  • Privacy & human rights security (1)
  • Privacy & security (2)
  • Privacy security (114)
  • Privacy v. national security (1)
  • Privacy v. security (1)
  • Private data security (47)
  • Private information security (1)
  • Private investigations (3)
  • Private security (10)
  • Private security ventures (1)
  • Private spy (1)
  • Privatizing the national security (1)
  • Pro et contra (1)
  • Pro-islamist's revelation (1)
  • Procurement safety (1)
  • Procurement security (2)
  • Profiling (2)
  • Prohibited supplies of weapons (1)
  • Propaganda warfare (1)
  • Propaganda wars (1)
  • Protection as usual (1)
  • Protection failure (2)
  • Provisions security (1)
  • Proxy war (2)
  • Psy-ops (4)
  • Psychological warfare (3)
  • Psyops (1)
  • Public alerts (1)
  • Public health threat (1)
  • Public media legislation (1)
  • Public safety (2)
  • Public security (234)
  • Publisher security (1)
  • Puiblic security (1)
  • Q & A (1)
  • Quantum computing (1)
  • Questionable spending (1)
  • R & D (1)
  • R&D (2)
  • Race & guns (1)
  • Racial profiling (2)
  • Radar (15)
  • Radiation dafety (1)
  • Radiation safety (128)
  • Radiation security (5)
  • Radical ideology (1)
  • Radioelectronic warfare (1)
  • Rare metals supply security (1)
  • Reconnaissance (2)
  • Reconnaissance flights (1)
  • Referendum (1)
  • Referendum results (2)
  • Refugees and asylum-seekers (1)
  • Regional security (1)
  • Regional tensions (1)
  • Religion (16)
  • Religion security (5)
  • Religious reconciliation (1)
  • Religious security (2)
  • Remote control combat (1)
  • Remote sensing (2)
  • Remote viewing (1)
  • Remote viewing & national security (4)
  • Reporters security (1)
  • Research (6)
  • Research results (11)
  • Resignation (1)
  • Resolute & vigilant defiance (1)
  • Results of low security culture (1)
  • Retaliation for 9/11 attack? (1)
  • Revelations of a spy (1)
  • Revelations of spy (1)
  • Revoking citizenship (1)
  • Revolutions come from abroad (1)
  • Revolving doors (2)
  • Rhino horn trafficking (1)
  • Right-wing return (1)
  • Risk equation (1)
  • Risk taking (1)
  • Risky business (1)
  • Risky profession (1)
  • Road security (1)
  • Roads safety (1)
  • Robots (66)
  • ROI & defense industry (1)
  • Romanovs return (1)
  • Rotten investigation (1)
  • Rotten values (1)
  • Royal secrets (1)
  • Rule of law (1)
  • Russia (1)
  • Russia reports destruction of all remaining chemical weapons (1)
  • Russia's election (1)
  • Russia's elections (2)
  • Russian assets seizure (1)
  • Russian elections (5)
  • Russian Military Uses Syria as Proving Ground (1)
  • Russian probe (1)
  • Russian revolution (1)
  • Russian roulette (3)
  • Sabotage (4)
  • Sanctions (28)
  • Satellite imagery (1)
  • says agency had ample warning (1)
  • Scam (19)
  • Scams (1)
  • Scandinavian cold comes to election (1)
  • School security (1)
  • Science (24)
  • Science & security (1)
  • Science & technology (1)
  • Science & technology in defense (1)
  • Science security (1)
  • Science vs. liars (1)
  • SCOTUS (1)
  • Sea port security (1)
  • Secret demands transparency (1)
  • Secret dossier (1)
  • Secret justice (1)
  • Secret paper (1)
  • Secret routes (1)
  • Secret site (1)
  • Secret wars (1)
  • Secrets smuggling (1)
  • Security assistance (1)
  • Security breaches (1)
  • Security career (1)
  • Security clearance (10)
  • Security concern (2)
  • Security culture (2)
  • Security guarding (1)
  • Security implications (1)
  • Security industry (1)
  • Security law (1)
  • Security of intellectual property (1)
  • Security priorities (1)
  • Security reform (1)
  • Security threat (3)
  • Security threats (1)
  • Security-minded spouse (1)
  • Seismic security (62)
  • Sensemaking (1)
  • Sensitive issue (1)
  • Severe blow to the civilization (1)
  • Sex & drugs trap (1)
  • Sex abuse (1)
  • Sex offence (1)
  • Sex security (1)
  • Sex trafficking (2)
  • Sexual harassment (2)
  • Sexual security (1)
  • Sexuality & military (1)
  • Shady business (1)
  • Shift from strategic collection and analysis (1)
  • Shipbuilding (3)
  • Shootings in class (1)
  • Sic transit gloria mundi (2)
  • SIGINT (1)
  • Simulation (1)
  • Simulations (1)
  • Slavery (5)
  • Slavery & human tafficking (1)
  • Smart grid security (1)
  • Smuggling (14)
  • Snowden (15)
  • Social media & national security (2)
  • Social media intelligence (1)
  • Social media security (2)
  • Social network security (1)
  • Social networking security (1)
  • Social security (13)
  • Social security loophole (1)
  • Society (1)
  • Soft power (3)
  • Software security (1)
  • Solemn ceremony (1)
  • Sorge (1)
  • Space defense (1)
  • Space Force (1)
  • Space protection (1)
  • Special forces (5)
  • Special forces history (1)
  • Special operations (4)
  • Special Operations forces (1)
  • Spies' revelations (1)
  • Sport & corruption (1)
  • Sport security (33)
  • Spy art (1)
  • Spy claims investigation (1)
  • Spy death (1)
  • Spy diversity (1)
  • Spy elite revelations (1)
  • Spy fate (1)
  • Spy fictions (1)
  • Spy flight (1)
  • Spy games (1)
  • Spy hunting (1)
  • Spy memoirs (1)
  • Spy missions (1)
  • Spy Museum (1)
  • Spy parole (2)
  • Spy policy (1)
  • Spy release (1)
  • Spy scare (1)
  • Spy security (2)
  • Spy spending (1)
  • Spy story (119)
  • Spy swap (1)
  • Spy tech (1)
  • Spy terminology (1)
  • Spy tradecraft in literature (1)
  • Spy v. intelligencer (1)
  • Spy v. spy (1)
  • Spy wars (5)
  • Spy work (22)
  • Spy writing (1)
  • Spycraft (5)
  • Spying on close friends (1)
  • Stalin offspring (1)
  • Star wars (1)
  • State of emergency (1)
  • State property arrests (1)
  • State security (1)
  • State terror (1)
  • Statecraft (93)
  • Stealth technologies (1)
  • Sting operation (1)
  • Strategic deception (1)
  • Strategic horizons (1)
  • Strategic mistake (1)
  • Strategy for peace (1)
  • Strategy required (1)
  • Stratfor (2)
  • Street surveillance (1)
  • Strike from abroad (1)
  • Study results (1)
  • Stupid war (1)
  • Sunset of the Bush dynasty (1)
  • Supercomputers (1)
  • Supersense (1)
  • Supply-chain security (1)
  • Surveillance (17)
  • Surveillance & privacy (1)
  • Surveillance & Reconnaissance (1)
  • Surveillance and control systems (1)
  • surveillance and reconnaissance (1)
  • Surveillance law (1)
  • Survey results (3)
  • Survivalism (3)
  • Suspicions (1)
  • Suspicious purchases (1)
  • Sustained bombing (1)
  • Swim safety (1)
  • Symbols & politics (1)
  • Syrian crisis (1)
  • Syrian war (97)
  • Tank protection (1)
  • Tanks (1)
  • Tax avoidance (9)
  • Tax compliance security (1)
  • Tax evasion (5)
  • Tax fraud (2)
  • Technological competition (1)
  • Technology (1)
  • Technology security (2)
  • Techology (1)
  • Telepathy (1)
  • Telepathy & national security (1)
  • Tempting target (1)
  • Terror & corruption (1)
  • Terror & politics (1)
  • Terror & sex crimes (1)
  • Terror attack (4)
  • Terror attacks (3)
  • Terror prevention (6)
  • Terror sponsoring (1)
  • Terror supply chain (1)
  • Terror support (1)
  • Terror targets (2)
  • Terror threat (473)
  • Terrorism (7)
  • Terrorism blacklist (1)
  • Terrorism financing (1)
  • Terrorism investigation (2)
  • Terroristic act (4)
  • Terroristic acts (1)
  • Terrror threat (1)
  • The damage was done (1)
  • The lame duck activities (1)
  • The same grabbers (1)
  • The time for analysis (1)
  • Think tanks (1)
  • Thinking on unthinkable (1)
  • Threat & response (1)
  • Threat assessment (3)
  • Threat detection (1)
  • Threat intelligence (2)
  • Threat level (1)
  • Threat of extremism (1)
  • Threat prevention (1)
  • Threat profiling (1)
  • Threat to area of interest (1)
  • Threat to civilization (1)
  • Threats (1)
  • Threats & fears (1)
  • Thug's taste (1)
  • Time machine (1)
  • Time to learn (1)
  • Tolerance & selfsacrifice (1)
  • Top 10 fears (1)
  • Top secret (2)
  • Tortures (71)
  • Tough Reagan style (1)
  • Toward palace coup (1)
  • Trade secrets (1)
  • Trade secrets security (3)
  • Trade war (8)
  • Trade wars (25)
  • Traffic security (5)
  • Trafficking by sea (1)
  • Train attack (1)
  • Transparency (1)
  • Transport security (7)
  • Transportation security (43)
  • Travel blacklist (1)
  • Travel security (3)
  • Treachery (1)
  • Treason (4)
  • Treasure finding (1)
  • Treasure hunt (1)
  • Treasure trove (2)
  • Trial security (1)
  • Triple agent (1)
  • Trips security (1)
  • Triumph & misery of a secret agent (1)
  • Trump style immigration control (1)
  • Turkey elections (1)
  • Turkish premeditated attack (1)
  • Two years sentence (1)
  • U.K. elections (1)
  • U.S. election (1)
  • U.S. elections (11)
  • U.S. electons (1)
  • U.S. probe (1)
  • UFO (5)
  • UFO mystery (1)
  • UK elections (1)
  • UK elections poll results (1)
  • Ukraine crisis (1)
  • Ukraine election (1)
  • Ukrainian crisis (27)
  • Ultimate goal (1)
  • Undercover agent (1)
  • Undercover policing (2)
  • Underwater scientific reserch (1)
  • Union sues feds over hack (1)
  • Unsolved mysteries and loose ends (1)
  • US elections (4)
  • V-day celebration (1)
  • Vehicle protection (1)
  • Very special art (1)
  • Vietnam war (2)
  • Views & opinions (7)
  • Violating austerity rules (1)
  • Violence threat (1)
  • Vote results (1)
  • Waiting for the intrusion into Russian electoral system (1)
  • War (1)
  • War & law (2)
  • War crimes (2)
  • War doctrine (1)
  • War funding (1)
  • War on drugs (3)
  • War on terror (327)
  • War on terror and its costs (1)
  • War prevention (2)
  • War results (1)
  • War rules (1)
  • War scenario (1)
  • Warfare (3)
  • Warrantless surveillance (1)
  • Warship security (1)
  • Wartime crimes (1)
  • Water security (5)
  • Water supply security (7)
  • Waterways security (1)
  • Weapon smuggling (10)
  • Weapon trafficking (1)
  • Weapons (427)
  • Weapons deliveries (1)
  • Weapons smuggling (16)
  • Weapons trafficking (9)
  • Weather & power grid security (1)
  • Weather security (66)
  • Web security (1)
  • Western Pacific (1)
  • What does it mean? (1)
  • Whistleblowing (128)
  • Whom to attack - terrorists or their sponsors? (1)
  • Wikileaks (1)
  • Wildlife security (3)
  • Wildlife smuggling (13)
  • Wildlife trafficking (4)
  • Wildlive smuggling (1)
  • Witch hunt (1)
  • Witch hunting (1)
  • WMD (1)
  • WMD conspiracy (1)
  • WMD counter proliferation (1)
  • WMD defense (1)
  • WMD threat (3)
  • Women's rights (1)
  • Work safety (1)
  • World Humanitarian Day (1)
  • World threats (1)
  • World trade security (2)
  • WW II (2)
  • WW II Victory Commemoration (1)
  • WW2 history (1)
  • WWI history (1)
  • WWII history (37)
  • WWII secrets (3)
  • Yemen knot (5)
  • Yemeni knot (17)
  • Yemeni war (2)
  • You will know them by their fruits (Matthew (1)
  • Сorruption (1)
  • Сounterinsurgency (1)
  • Сounterintelligence (1)
  • Сybersecurity (1)
  • Удусешщт ыусгкшен (1)
  • Экономическая безопасность (1)

Translate

Followers

Blog Archive

  • ►  2020 (1549)
    • ►  December (62)
    • ►  November (160)
    • ►  October (141)
    • ►  September (109)
    • ►  August (57)
    • ►  July (87)
    • ►  June (42)
    • ►  May (160)
    • ►  April (171)
    • ►  March (197)
    • ►  February (235)
    • ►  January (128)
  • ►  2019 (2098)
    • ►  December (176)
    • ►  November (151)
    • ►  October (196)
    • ►  September (216)
    • ►  August (67)
    • ►  July (2)
    • ►  June (3)
    • ►  May (185)
    • ►  April (319)
    • ►  March (310)
    • ►  February (196)
    • ►  January (277)
  • ►  2018 (2247)
    • ►  December (122)
    • ►  November (39)
    • ►  October (110)
    • ►  September (104)
    • ►  August (138)
    • ►  July (217)
    • ►  June (139)
    • ►  May (291)
    • ►  April (303)
    • ►  March (330)
    • ►  February (256)
    • ►  January (198)
  • ►  2017 (3749)
    • ►  December (252)
    • ►  November (235)
    • ►  October (209)
    • ►  September (201)
    • ►  August (168)
    • ►  July (273)
    • ►  June (408)
    • ►  May (351)
    • ►  April (321)
    • ►  March (339)
    • ►  February (395)
    • ►  January (597)
  • ▼  2016 (5725)
    • ►  December (533)
    • ▼  November (486)
      • Nuclear smuggling Finding a Nuclear Weapon: Hope...
      • Nuclear smuggling Scientists have found a way to ...
      • Radiation safety Little-Known US Nuclear Site Is ...
      • Arms smuggling Border Police bust gun traffickin...
      • Immigration security Grounded Surveillance Opera...
      • Election security Election Security is a Matter o...
      • Human smuggling 2 Fort Bliss soldiers plead guilt...
      • Election security The Latest: Wis. judge rejects...
      • Innovations & technologies Radioactive diamonds ...
      • Weapons POLITICAL AIRPOWER, PART II: THE SEDUCTI...
      • Missile defense Get Ready Russia, China, Iran an...
      • Innovations & technologies Biometric Dehydration ...
      • Airport security New Berlin Airport Aquires High ...
      • Economic security Oil prices surge as OPEC reach...
      • Energy security Brexit puts Europe’s nuclear fusi...
      • Intel warning CIA chief warns Trump: Scrapping I...
      • Statecraft Trump says will leave business to foc...
      • Electronic surveillance UK green-lights mass spyi...
      • Intel history London's most infamous spy location...
      • Whistleblowing 'CIA created ISIS', says Julian A...
      • Extremism Germany extremism: Intelligence agency...
      • Politics Dutch far-right Party for Freedom tops ...
      • International security Will new American & Frenc...
      • Electoral battles Under the Hood: How Donald Tru...
      • Cybersecurity Trump visits with national securit...
      • National security What to know about KT McFarland...
      • Statecraft Heavy lifting ahead as Trump builds n...
      • Drug smuggling Casey Anthony's disbarred lawyer j...
      • Immigration security Homeland Security Report Sh...
      • Health security Baby Boomers, Relax. It Probably...
      • Citizenship Trump Calls for Revoking Flag Burner...
      • Flight security Canada steps away from online re...
      • Personal security Active attacker survival tips f...
      • Immigration security National Security Expert: O...
      • Weapons 20 Knives of Russian Military and Law En...
      • National security Serious Changes Possible for Na...
      • Immigration security The Coming Immigration Clas...
      • Election security PRESIDENTIAL RECOUNT: HOW IT W...
      • Weather security Saudi Arabia snowfall turns des...
      • Intellectual property security 'Buyer Beware!' Co...
      • Intel briefing Kellyanne Conway: Donald Trump’s i...
      • Human trafficking Police smash terror cell 'smug...
      • People smuggling Police investigating an internat...
      • Drug smuggling Drug smuggling at ports in Peru r...
      • National security How Trump should handle nation...
      • Statecraft Trump adds Fox News' KT McFarland to ...
      • Military Why Is Military So Powerful In Pakistan...
      • Health security Three Ways to Find More Disease ...
      • Biosecurity Zika virus: Texas reports first case...
      • Election security Wisconsin elections staff urge ...
      • Opinion SADDAM AND GADHAFI: NOT THE CRIMINALS YOU...
      • Private data security Germany planning to 'massi...
      • Information security Emails: CIA Official Review...
      • Fraud FBI tips for online shoppers The FBI's ...
      • Navy The U.S. Navy Is Already Designing the Next...
      • Military Trump to inherit ‘weak’ Army, military ...
      • Environmental security Denmark urged to clean up...
      • Innovations & technologies The fastest supercompu...
      • Drug smuggling Multi-million dollar fentanyl smu...
      • Drug smuggling Three people held in alleged drug...
      • Immigration security Adviser To Trump Transition...
      • National security Govt to Establish National Sec...
      • Military Air Force Testing New Maternity Uniform...
      • Outerspace This Remote Military Base Is Where Chi...
      • Radiation safety Report: Nuclear material said s...
      • Cybersecurity NSA Director asks American CEOs to ...
      • National security Why Did Team Obama Try to Take ...
      • National security Ideology Is Supplanting Intell...
      • Modern warfare Terrain Dominance Technologies – E...
      • Honeypot trap The Story Of Marita Lorenz, the CI...
      • Electronic surveillance UK Becomes Surveillance ...
      • Spy story Revolutionary lover: Fidel Castro’s cl...
      • Health security Nuclear Medicine: Russia Builds U...
      • Nuclear security Documents Reveal Just How Freak...
      • Arms smuggling Border gun-smuggling arrests don'...
      • Food smuggling How High Cost Of Rice Made Smuggl...
      • Electronic surveillance French Authorities Deplo...
      • People smuggling People Smugglers Who Trafficked...
      • Assassination plots Myriad ways CIA tried and fa...
      •  Forensics Revolution in Automotive Forensics ...
      • Corruption In Brazil, Major New Corruption Scanda...
      • International security 15 European leaders call ...
      • Election security U.S. Officials Defend Integrit...
      • War on terror CIA honors Alabamian Mike Spann 15 ...
      • Terror threat Europe: Let's Self-destruct! R...
      • Covert operations The Iran-Contra Affair 30 Year...
      • Criminal investigation The Single-Assassin Theor...
      • Criminal investigation CIA Quietly Declassifies R...
      • Statecraft General David Petraeus - the ex-CIA bo...
      • War on terror Obama administration expands elite ...
      • Innovations & technologies BAE To Build Explosio...
      • Industrial safety China power station collapse k...
      • Radiation safety Your Radiation This Week No 81 ...
      • Asia Pacific Officials: Multilateral Effort Need...
      • Private data security Navy: Personal Data of 134...
      • Politics First Brexit, then Trump, what will be ...
      • Economic security Upcoming votes could test the ...
      • Politics Austria Poised to Elect Rightist as Eur...
      • Foreign policy What’s So Great About American Wo...
      • Immigration security Immigration Lawyers Are Advi...
    • ►  October (394)
    • ►  September (392)
    • ►  August (579)
    • ►  July (521)
    • ►  June (533)
    • ►  May (526)
    • ►  April (625)
    • ►  March (411)
    • ►  February (378)
    • ►  January (347)
  • ►  2015 (8069)
    • ►  December (282)
    • ►  November (389)
    • ►  October (603)
    • ►  September (573)
    • ►  August (576)
    • ►  July (507)
    • ►  June (443)
    • ►  May (806)
    • ►  April (844)
    • ►  March (1022)
    • ►  February (919)
    • ►  January (1105)
  • ►  2014 (1683)
    • ►  December (900)
    • ►  November (436)
    • ►  October (303)
    • ►  September (20)
    • ►  August (19)
    • ►  July (5)
  • ►  2011 (1)
    • ►  July (1)

Популярные сообщения

  • (no title)
    Environmental security Nanomaterials Can Now Absorb Oil Spills Researchers at Australia’s Deakin University have developed a material t...
  • (no title)
    War on terror How to fight the lone wolf Pakistani human rights activists light lamps as they take part in a protest in Karachi ...
  • (no title)
    Corruption South Korea’s Corruption Crisis: Sung Wan-jong’s List and Its Fallout The South Korean political scene is embroiled in a sen...
  • (no title)
    Treachery 72 DHS Employees on Terrorist Watch List Rep. Stephen Lynch (D., Mass.) disclosed that a congressional investigation recentl...
  • (no title)
    Web security Client-side web security Obviously, enterprise teams should integrate client-side protections with desired server-side co...
  • (no title)
    Aerospace WATCH THIS SUPERFAST RAIDER HELICOPTER TAKE ITS FIRST FLIGHT Early this morning in West Palm Beach, Florida, a brand-new he...
  • (no title)
    Economic security Ending The Pentagon's Long Con Donald Trump is a con man. Think of  Trump University  or a juicy  Trump steak  ...
  • (no title)
    Economic security Siberian Surprise: Russian Oil Patch Just Keeps Pumping In the fight for market share among the world’s oil producer...
  • (no title)
    Вопросы биологической безопасности СМИ: боевики ИГИЛ намеревались использовать бубонную чуму в качестве оружия Москва, 30 августа ...
  • (no title)
    Revoking citizenship Netanyahu: Israelis joining ISIS will lose citizenship Share on Twitter Anyone joining  Islamic State  will fo...

Pageviews past week

Travel theme. Powered by Blogger.