Examples of using Intelligence information in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
Artificial Intelligence Information Systems.
This was particularly helpful for Hitler, who constantly requested intelligence information about Leningrad.
Intelligence information about planned al-Qaeda attacks against.
Recognizes and exploits intelligence information.
Analyzes and exploits intelligence information, develops targets, and provides situational awareness for operations personnel and key leadership.
First, the Soviet leadership and command of the Red Army,despite numerous intelligence information, was confident that the war would begin later than June 22, 1941.
Section 702 FISA allows the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information(145).
The purpose of project GRUDGE was to collect all scientific, technological,medical and intelligence information from UFO/IAC sightings and contacts with alien life forms.
Syria will only share intelligence information with France if Paris changes its policies in the region, President Bashar al-Assad said in an interview with French magazine Valeurs Actuelles.
Finally, a common pre-frontier intelligence picture could be developed to combine intelligence information with that obtained from surveillance tools.
The attack was prevented thanks to accurate intelligence information of the Shin Bet that enabled the arrests of members of a cell before they managed to execute the serious attack.
Overall, a more'risk based' approach to establish EU mitigating measures is a concept which may be further developed in order to target security controls where,based on intelligence information, the risk is greatest.
Intelligence information, law enforcement information, and I think in the near future, we will be able to put out a paper, a document, that will describe quite clearly the evidence that we have.".
As the above analysis has shown, U.S. law ensures that surveillance measures willonly be employed to obtain foreign intelligence information- which is a legitimate policy objective(97)- and be tailored as much as possible.
The ability to critically analyze intelligence information and global security issues, interpret historical and contemporary issues informing the field, and perform textual analyses, defines the program core's most important learning outcomes.
We believe they(the three missing soldiers) were abducted by terrorists belonging to al-Qaeda or an affiliated group andthis assessment is based on highly credible intelligence information," chief military spokesman Major-General William Caldwell said.
According to Israel's Hadashot news and Channel 10 news,Netanyahu will reveal intelligence information, based on a large cache of documents recently obtained by Israel, which he believes proves Iran has duped the world regarding the state of its nuclear program.
Collection is targeted through the use of individual selectors, such as e-mail addresses or telephone numbers, which U.S. intelligence personnel have determined arelikely being used to communicate foreign intelligence information of the type covered by the certification submitted to the court(20).
Joseph Stalin was well aware of the domesticpolitical situation in Finland based on Soviet intelligence information, and thus did not anticipate that the establishment of the People's Republic would cause any revolutionary action or popular uprisings against the existing Finnish Government.
Whereas mixing intelligence and law enforcement information entails major legal challenges and risks due to the different accountability rules applying to both types of information, including risks to the fundamentalright of suspects to a fair trial when intelligence information is used as evidence in court proceedings;
Joseph Stalin was well aware of the domesticpolitical situation in Finland based on Soviet intelligence information, and thus did not anticipate that the establishment of the People's Republic would cause any revolutionary action or popular uprisings against the existing Finnish Government.[11].
Section 702 authorizes NSA to intercept communications of non-United States persons who are outside the United States only if it reasonably believes that a particular‘identifier'(for example, an e-mail address or a telephone number)is being used to communicate foreign intelligence information related to such matters as international terrorism, nuclear proliferation, or hostile cyber activities.”.
A senior intelligence official, meanwhile,said that Israel had never received so much intelligence information in one fell swoop as it did several weeks ago, when Mossad agents managed to penetrate what Netanyahu described Monday as a“dilapidated warehouse” in south Tehran's Shorabad district and smuggle half a ton of documents to Israel.
The agency's mission is to prevent“foreign adversaries from gaining access to sensitive orclassified national security information,” as well as collecting“intelligence information from foreign signals for intelligence and counterintelligence purposes and to support military operations.”.
Stronger data feedback and dissemination channels were established through the Atlas of Infectious Diseases,the further extension of the Epidemic Intelligence Information System(EPIS)9 and its integration with molecular surveillance for Food- and Waterborne Diseases.
Persons outside the U.S. only if it can be reasonably believed that a given means of communicationis being used to communicate foreign intelligence information(e.g. related to international terrorism, nuclear proliferation or hostile cyber activities).
While the FISC does not assess- under a probable cause or any other standard-that individuals are properly targeted to acquire foreign intelligence information(149), its control extends to the condition that‘a significant purpose of the acquisition is to obtain foreign intelligence information'(150).
Although the telex service, dubbed Condortel, was officially meant to be used by South American officers under military training by the US in Panama, a cable from the US embassy in Paraguay toWashington is also employed to coordinate intelligence information among the Southern Cone countries, according to one, 1981, US state department document,“This is the Condor network which all of us have heard about over the last few years.”.
Heterogeneous byte-assets(indigenous digital currency, digital assets) that operate in different forms on the Bytom Blockchain and atomic assets(warrants, securities, dividends,bonds, intelligence information, forecasting information and other information that exist in the physical world) can be registered, exchanged, gambled and engaged in other more complicated and contract-based interoperations via Bytom.