-
1
The Kurdish Movement’s Factor in US Politics at the Peak of Iran and Afghanistan Crises, 1979 – January 1981
Published 2023-11-01Subjects: Get full text
Article -
2
From the History of Corporate Mercenarism: British Clandestine Operation in the North Yemen in 1960s
Published 2020-11-01Subjects: Get full text
Article -
3
Military Deterrence vs Foreign Interference? Record of the Cold War
Published 2023-03-01Subjects: Get full text
Article -
4
Design of a Printed Dipole Antenna Array for a Passive Radar System
Published 2013-01-01“…Passive radar (or Passive Coherent Localisation) is an advancing technology for covert operation. The signal transmitted from sources of opportunity such as radio or TV stations is used as illumination for a certain area of interest. …”
Get full text
Article -
5
Ou metodes van die Satan in 'n moderne samelewing - met besondere verwysing na Openbaring 2 en 3
Published 2000-12-01“…Satan is a master at camouflage and subtle covert operations. 5. He uses man's external circumstances such as his longing for earthly possessions and wealth, his self-satisfaction, his search for instant gratification, his smugness and frailty to gain the upper hand, in order to bring about the fall of a congregation. …”
Get full text
Article -
6
Navigating ALICE: Advancements in Deployable Docking and Precision Detection for AUV Operations
Published 2024-12-01“…This adaptable design is suitable for temporary installations and in acoustically sensitive or covert operations. The positioning and guidance system employs a multi-sensor approach, integrating range and azimuth data from the sonar with elevation data from the vision camera to achieve precise 3D positioning and robust navigation in varying underwater conditions. …”
Get full text
Article -
7
Optimalisasi Strategi Intelijen dalam Menghadapi Ancaman TPPO Jaringan Kamboja dan Implikasinya bagi Keamanan Nasional
Published 2024-12-01“…The cyber security intelligence strategy includes data collection, data analysis, and covert operations, such as wiretapping, cyber patrols, and situational control operations. …”
Get full text
Article