Showing 1 - 9 results of 9 for search '"counterintelligence"', query time: 0.03s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Socially Dangerous Behavior as the Mandatory Feature of the Objective Aspect of Crime Under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2019-05-01
    “…The author believes that the collection of data for the purpose of transferring to foreign enterprises, institutions, organizations or their representatives that constitutes official information collected in the process of operative and search, counterintelligence activities, in the field of defense of the country, should be considered as a process, which depending on the situation, may include: detection of information (its carriers), its recording (in memory or by technical means: photo, video, audio recording, copying of documents, electronic documents on USB, HDD, CD drives, etc.); removal of recorded information in the form of a copy or the original carrier from the location; placing the retrieved information in a specific place for storage and further transfer. …”
    Get full text
    Article
  9. 9

    Current Aspects of Legal Regulation for Monitoring Electronic Communications and Removal of Information from Electronic Communication Networks in Ukraine by V. M. Lazebnyi

    Published 2021-09-01
    “…The author has suggested measures, the realization of which should improve the capacity of authorized law enforcement agencies to combat crime in the field of information and communication technologies: adoption of the Law of Ukraine “On Interception of Electronic Communications”, amendments to the Laws of Ukraine “On Electronic Communications”, “On Operative and Search Activities”, “On Counterintelligence Activities”, “On Combating Terrorism”; bringing the norms of domestic legislation in line with the provisions of the Convention on Cybercrime; creation of conditions necessary to improve the capacity of authorized state agencies to remove information from electronic communication networks; establishing proper cooperation with foreign law enforcement agencies.…”
    Get full text
    Article