Blog page 453

Motion of no confidence

A motion of no-confidence, or a vote of no confidence, or no confidence motion, is a statement or vote about whether a person in a position of responsibility is no longer deemed fit to hold that position, perhaps because they are inadequate in so ...

2008 Lok Sabha vote of confidence

The United Progressive Alliance, the governing alliance in India elected in 2004, faced its first confidence vote in the Lok Sabha on 22 July 2008 after the Communist Party of India -led Left Front withdrew support over India approaching the IAEA ...

2017 vote of no confidence in the government of Mariano Rajoy

A vote of no confidence in the Spanish Peoples Party Government of Mariano Rajoy was announced on 27 April 2017 and held on 13–14 June. The motion of no confidence was formally registered on 19 May by Unidos Podemos after a massive corruption cas ...

2018 vote of no confidence in the government of Mariano Rajoy

A motion of no confidence in the Spanish government of Mariano Rajoy was held between 31 May and 1 June 2018. The motion was registered by the Spanish Socialist Workers Party on 25 May after the ruling Peoples Party was found to have profited fro ...

Article 49 of the French Constitution

Article 49 of the French Constitution is an article of the French Constitution, the fundamental law of the French Fifth Republic. It sets out the political responsibility of the government towards the parliament. It is part of Title V: "On relati ...

Constructive vote of no confidence

The constructive vote of no confidence is a variation on the motion of no confidence that allows a parliament to withdraw confidence from a head of government only if there is a positive majority for a prospective successor. The principle is inte ...

Confidence motions in Dail Eireann

If a motion of no confidence in the Taoiseach or Government of Ireland is passed by Dail Eireann, or a motion of confidence is defeated, then the Constitution requires both the Taoiseach and the Government to resign. After this, either a replacem ...

Kuwait National Assembly No-Confidence Votes

Kuwait National Assembly No-Confidence Votes The questioning of Cabinet ministers can lead to their impeachment, which the government usually avoids by resignations, reshuffles and dissolving the legislature. Since its inception in 1962, the Nati ...

List of prime ministers defeated by votes of no confidence

Edward Natapei 2010 Maxime Carlot Korman 1996 Serge Vohor 2004 Sato Kilman 2011 Barak Sope 2001

Matter of Confidence

A Matter of Confidence or Issue of Confidence is an important bill - such as a budget - passed by the responsible house. If a government fails to pass a bill considered a matter of confidence, it is assumed the government has lost the confidence ...

Czech Republic Government Vote of No Confidence, 2015

The Parliament of the Czech Republic vote of no confidence in the current Czech Republic government of the Prime Minister Bohuslav Sobotka was held on Tuesday 26 May 2015. The vote was initiated because of opposition concerns about conflicts of i ...

National security

National security or national defense is the security and defense of a nation state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military attack, nationa ...

Security agency

A security agency is a governmental organization which conducts intelligence activities for the internal security of a nation. They are the domestic cousins of foreign intelligence agencies, and typically conduct counterintelligence to thwart oth ...

Advance Passenger Information System

Advance Passenger Information System or APIS is an electronic data interchange system established by the U.S. Customs and Border Protection, APIS governs the provision of a limited number of data elements identification details from the passport ...

Climate security

Climate-related security risks have far-reaching implications for the way the world manages peace and security. Climate security is a concept that summons the idea that climate-related change amplifies existing risks in society that endangers the ...

Compartmentalization (information security)

Compartmentalization, in information security, whether public or private, is the limiting of access to information to persons or other entities on a need-to-know basis to perform certain tasks. It originated in the handling of classified informat ...

Counter-terrorism

Counter-terrorism, also known as antiterrorism, incorporates the practice, military tactics, techniques, and strategy that government, military, law enforcement, business, and intelligence agencies use to combat or prevent terrorism. Counter-terr ...

Curfew

A Curfew is an order specifying a time during which certain regulations apply. Typically it refers to the time when individuals are required to return to and stay in their homes. Such an order may be issued by public authorities but also by the o ...

Curfew bell

The curfew bell was a bell rung in the evening in Medieval England as the curfew signal for everyone to go to bed. A bell was rung usually around eight oclock in the evening which meant for them to cover their fires - deaden or cover up, not nece ...

Cyber resilience

Cyber resilience refers to an entitys ability to continuously deliver the intended outcome despite adverse cyber events. Cyber resilience is an evolving perspective that is rapidly gaining recognition. The concept essentially brings the areas of ...

Cyber sovereignty

Cyber sovereignty is a phrase used in the field of Internet governance to describe governments desire to exercise control over the Internet within their own borders, including political, economic, cultural and technological activities. In his 201 ...

Cyber spying

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for persona ...

Cyber spying on universities

Cyber spying on universities is the practice of obtaining secrets and information without the permission and knowledge of the university through its information technology system. Universities in the United Kingdom, including Oxford and Cambridge ...

Cyber-collection

Cyber-collection refers to the use of cyber-warfare techniques in order to conduct espionage. Cyber-collection activities typically rely on the insertion of malware into a targeted network or computer in order to scan for, collect and exfiltrate ...

Cyberwarfare

Cyberwarfare is the use of technology to attack a nation, causing comparable harm to actual warfare. There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists. One view is that the term cy ...

D-Day Daily Telegraph crossword security alarm

In 1944, codenames related to the D-Day plans appeared as solutions in crosswords in the British newspaper, The Daily Telegraph, which the British Secret Services initially suspected to be a form of espionage.

De-escalation

De-escalation refers to behavior that is intended to escape escalations of conflicts. It may also refer to approaches in conflict resolution. Escalations of commitment are often hard from spiraling out of proportions without specific measures bei ...

Death squad

A death squad is an armed group that conducts extrajudicial killings or forced disappearances of persons for the purposes such as political repression, assassinations, torture, genocide, ethnic cleansing, or revolutionary terror. These killings a ...

Domain Based Security

"Domain Based Security", abbreviated to "DBSy", is a model-based approach to help analyse information security risks in a business context and provide a clear and direct mapping between the risks and the security controls needed to manage them. A ...

E-QIP

e-QIP is a secure website managed by OPM that is designed to automate the common security questionnaires used to process federal background investigations. e-QIP was created in 2003 as part of the larger e-Clearance initiative designed to speed u ...

Economics of defense

The economics of defense or defense economics is a subfield of economics, an application of the economic theory to the issues of military defense. It is a relatively new field. An early specialized work in the field is the RAND Corporation report ...

Elements of national security

National security has a number of component elements which, when individually satisfied, provide a nation with security of its values, interests and freedom to choose policy. These are listed differently by various authorities. Besides the milita ...

Environmental security

Environmental security examines threats posed by environmental events and trends to individuals, communities or nations. It may focus on the impact of human conflict and international relations on the environment, or on how environmental problems ...

Failure in the intelligence cycle

For the album see Intelligence Failure Failure in the intelligence cycle or intelligence failure, is the outcome of the inadequacies within the intelligence cycle. The intelligence cycle itself consists of six steps that are constantly in motion. ...

Five Eyes

The Five Eyes is an anglophone intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals i ...

Ghost detainee

Ghost detainee is a term used in the executive branch of the United States government to designate a person held in a detention center, whose identity has been hidden by keeping them unregistered and therefore anonymous. Such uses arose as the Bu ...

Global surveillance

Global mass surveillance refers to the mass surveillance of entire populations across national borders. Its roots can be traced back to the middle of the 20th century when the UKUSA Agreement was jointly enacted by the United Kingdom and the Unit ...

List of government mass surveillance projects

Schengen Information System: A database kept for national security and law enforcement purposes. INDECT: Research project funded by the European Union to develop surveillance methods e.g. processing of CCTV camera data streams for the monitoring ...

Greek wiretapping case 2004–05

The Greek wiretapping case of 2004-2005, also referred to as Greek Watergate, involved the illegal tapping of more than 100 mobile phones on the Vodafone Greece network belonging mostly to members of the Greek government and top-ranking civil ser ...

High policing

High policing is a form of intelligence-led policing that serves to protect the national government or a conglomerate of national governments from internal threats; that is, any policing operations integrated into domestic intelligence gathering, ...

Information Security Automation Program

The Information Security Automation Program is a U.S. government multi-agency initiative to enable automation and standardization of technical security operations. While a U.S. government initiative, its standards based design can benefit all inf ...

Information sensitivity

Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others. Loss, misuse, modification, or unauthorized access to sensitive information can ad ...

Internal Security Service

Internal Security Service transliterated: Jahaz al Amn al Dakhly, is the national security agency of the Sultanate of Oman. The agency focuses solely upon domestic security while foreign intelligence operations is specifically handled by the Pala ...

International trade and state security

International economic structures range from complete autarky to complete market openness. This structure has undergone numerous changes since the beginning of the nineteenth century. The state-power theory as put into perspective by Stephen Kras ...

Lawfare

Lawfare is the misuse of legal systems and principles against an enemy, such as by damaging or delegitimizing them, tying up their time or winning a public relations victory. The term is a portmanteau of the words law and warfare.

List of people under Five Eyes surveillance

The "Five Eyes" refers to an alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are bound by the multilateral UKUSA Agreement for joint cooperation in signals intelligence, military intel ...

National Agency Check with Local Agency Check and Credit Check

National Agency Check with Local Agency and Credit Checks is a type of background check required in the United States for granting of security clearances. According to the United States Office of Personnel Management, Federal Investigations Notic ...

National Security Committee (Ireland)

The National Security Committee of Ireland is a secretive inter-departmental committee responsible for ensuring that the Taoiseach and Government of Ireland are kept informed of high-level national security, intelligence and defence issues, and t ...

National Security Whistleblowers Coalition

The National Security Whistleblowers Coalition, founded in 2004 by former FBI translator Sibel Edmonds in league with over 50 former and current United States government officials from more than a dozen agencies, is an independent, nonpartisan al ...

No-hearing hearings

No-Hearing Hearings is the title of a study published by Professor Mark P. Denbeaux of the Center for Policy and Research at Seton Hall University School of Law, his son Joshua Denbeaux, and prepared under his supervision by research fellows at t ...

Free and no ads
no need to download or install

Pino - logical board game which is based on tactics and strategy. In general this is a remix of chess, checkers and corners. The game develops imagination, concentration, teaches how to solve tasks, plan their own actions and of course to think logically. It does not matter how much pieces you have, the main thing is how they are placement!

online intellectual game →