ACTIVITY OF BRANCH 3 IN BYDGOSZCZ IN THE 1930s. OPERATION “WÓZEK”

2011 ◽  
Vol 162 (4) ◽  
pp. 200-208
Author(s):  
Joanna BOCHACZEK-TRĄBSKA

From the moment Poland regained independence, national security was threatened by Germany. This article shows the activity of Branch 3 of Unit II of the General Staff of the Polish Army in Bydgoszcz in the face of the war threat. Branch 3 conducted both military intelligence and counterintelligence activities. Operation “Wózek” carried out by the branch is worth attention. Its objective was to check German parcels, especially military ones, transported from Germany to East Prussia and the Free City of Gdańsk [Polish: Wolne Miasto Gdańsk]. Such a way of obtaining valuable intelligence material was not only important but also inexpensive. Operation “Wózek” contributed to the identification of German preparations for their aggression against Poland in September 1939.

2021 ◽  
pp. 000486582110039
Author(s):  
Benoît Dupont ◽  
Chad Whelan

‘Cybercrime’ is an umbrella concept used by criminologists to refer to traditional crimes that are enhanced via the use of networked technologies (i.e. cyber-enabled crimes) and newer forms of crime that would not exist without networked technologies (i.e. cyber-dependent crimes). Cybersecurity is similarly a very broad concept and diverse field of practice. For computer scientists, the term ‘cybersecurity’ typically refers to policies, processes and practices undertaken to protect data, networks and systems from unauthorised access. Cybersecurity is used in subnational, national and transnational contexts to capture an increasingly diverse array of threats. Increasingly, cybercrimes are presented as threats to cybersecurity, which explains why national security institutions are gradually becoming involved in cybercrime control and prevention activities. This paper argues that the fields of cyber-criminology and cybersecurity, which are segregated at the moment, are in much need of greater engagement and cross-fertilisation. We draw on concepts of ‘high’ and ‘low’ policing ( Brodeur, 2010 ) to suggest it would be useful to consider ‘crime’ and ‘security’ on the same continuum. This continuum has cybercrime at one end and cybersecurity at the other, with crime being more the domain of ‘low’ policing while security, as conceptualised in the context of specific cybersecurity projects, falls under the responsibility of ‘high’ policing institutions. This unifying approach helps us to explore the fuzzy relationship between cyber- crime and cyber- security and to call for more fruitful alliances between cybercrime and cybersecurity researchers.


2019 ◽  
Vol 20 (2) ◽  
pp. 87-119
Author(s):  
Bartosz Kapuściak

The primary task of the military intelligence in the People’s Republic of Poland was to acquire materials on the armament and stationing of NATO troops. However, due to the demand of the communist authorities, it also conducted political activities aimed at, among others, the Catholic Church. The interest of the state authorities increased especially during the pontificate of John Paul II. According to the assessment of military intelligence, the election of Karol Wojtyła as Bishop of Rome stimulated the Catholic Church both in Poland and in the Vatican. In this way, the activities of the Second Directorate of the General Staff of the Polish Army were within the scope of civil intelligence interests. The article aims to show the role played by intelligence officers and informers operating in Rome undercover as military attachés or in civilian institutions. Their actions resulted in the establishment of contacts with the church environment and acquisition of voluntary and involuntary informants. In this way, the Second Directorate of the General Staff of the Polish Army provided the party and political apparatus with interesting news and materials. Following the introduction of martial law in Poland, the church from the Rome area started sending parcels of food, clothes and medicines to Poland. This aid for the country was used to establish contact with the Polish clergy thanks to the initiative of Colonel Franciszek Mazurek.


2018 ◽  
Vol 115 (40) ◽  
pp. E9489-E9498 ◽  
Author(s):  
Qiang Wei ◽  
David M. Krolewski ◽  
Shannon Moore ◽  
Vivek Kumar ◽  
Fei Li ◽  
...  

Two classes of peptide-producing neurons in the arcuate nucleus (Arc) of the hypothalamus are known to exert opposing actions on feeding: the anorexigenic neurons that express proopiomelanocortin (POMC) and the orexigenic neurons that express agouti-related protein (AgRP) and neuropeptide Y (NPY). These neurons are thought to arise from a common embryonic progenitor, but our anatomical and functional understanding of the interplay of these two peptidergic systems that contribute to the control of feeding remains incomplete. The present study uses a combination of optogenetic stimulation with viral and transgenic approaches, coupled with neural activity mapping and brain transparency visualization to demonstrate the following: (i) selective activation of Arc POMC neurons inhibits food consumption rapidly in unsated animals; (ii) activation of Arc neurons arising from POMC-expressing progenitors, including POMC and a subset of AgRP neurons, triggers robust feeding behavior, even in the face of satiety signals from POMC neurons; (iii) the opposing effects on food intake are associated with distinct neuronal projection and activation patterns of adult hypothalamic POMC neurons versus Arc neurons derived from POMC-expressing lineages; and (iv) the increased food intake following the activation of orexigenic neurons derived from POMC-expressing progenitors engages an extensive neural network that involves the endogenous opioid system. Together, these findings shed further light on the dynamic balance between two peptidergic systems in the moment-to-moment regulation of feeding behavior.


2021 ◽  
Vol 16 (4) ◽  
pp. 529-545
Author(s):  
Julia Jordan

This article will explore the relationship between linguistic puns and knowledge, in particular puns in Christine Brooke-Rose's work, and what they tell us about knowledge: secret knowledge; encoded knowledge; latent knowledge that remains latent; and the refusal of knowledge. My title is an allusion to Frank Kermode's 1967 essay ‘Objects, Jokes, and Art’, where he puzzles away at his own difficulty with distinguishing avant garde writing and art, especially what he calls the ‘neo-avant garde’ of the 60s, from jokes. ‘I myself believe’, he writes anxiously, ‘that there is a difference between art and a joke’, admitting that ‘it has sometimes been difficult to tell.’ Brooke-Rose, whose work Kermode admired, is a perfect example of this. Her texts revolve around the pun, the surprise juxtaposition between semantic poles, the unexpected yoking together of disparate elements. Puns, for Brooke-Rose, sit at the juncture between the accidental and the overdetermined. So what is funny about the pun? Not much, I propose, or rather, it provokes a particular sort of ambivalent laughter which becomes folded into the distinctive character and affective potency of late modernism itself: its deadpan silliness; its proclivity to collision and violence; its excitability and its melancholy. Brooke-Rose's humour is thus of the difficult sort, that is, humour that reveals itself at the moment of its operation to be not all that funny. The unsettling laughter, I propose, that exposes literature's own incommensurability with itself. For Jacques Rancière, the novel must illuminate somehow the ‘punctuation of the encounter with the inconceivable’, in the face of which all is reduced to passivity. The pun, in particular, forces the readers’ passivity, and exposes us to limits of what can be known.


2019 ◽  
Vol 70 (1) ◽  
pp. 373-399 ◽  
Author(s):  
Angela L. Duckworth ◽  
Jamie L. Taxer ◽  
Lauren Eskreis-Winkler ◽  
Brian M. Galla ◽  
James J. Gross

Self-control refers to the alignment of thoughts, feelings, and actions with enduringly valued goals in the face of momentarily more alluring alternatives. In this review, we examine the role of self-control in academic achievement. We begin by defining self-control and distinguishing it from related constructs. Next, we summarize evidence that nearly all students experience conflict between academic goals that they value in the long run and nonacademic goals that they find more gratifying in the moment. We then turn to longitudinal evidence relating self-control to academic attainment, course grades, and performance on standardized achievement tests. We use the process model of self-control to illustrate how impulses are generated and regulated, emphasizing opportunities for students to deliberately strengthen impulses that are congruent with, and dampen impulses that are incongruent with, academic goals. Finally, we conclude with future directions for both science and practice.


2011 ◽  
Vol 54 (1) ◽  
pp. 125-141 ◽  
Author(s):  
Faruk Ekmekci

The conventional approach in the discipline of International Relations is to treat terrorist organizations as "non-state" actors of international relations. However, this approach is problematic due to the fact that most terrorist organizations are backed or exploited by some states. In this article, I take issue with the non-stateness of terrorist organizations and seek to answer the question of why so many states, at times, support terrorist organizations. I argue that in the face of rising threats to national security in an age of devastating wars, modern nation states tend to provide support to foreign terrorist organizations that work against their present and imminent enemies. I elaborate on my argument studying three cases of state support for terrorism: Iranian support for Hamas, Syrian support for the PKK, and American support for the MEK. The analyses suggest that, for many states, terror is nothing but war by other means.


Author(s):  
Francesca Romana Ficorilli

One of the most complete definitions of Trauma describes it as an "extreme, unsustainable and inevitable threatening experience, in the face of which the individual experiences a sense of helplessness", an event outside the range of usual human experiences, which overwhelm the normal human capacity for adaptation. A modern and current understanding of the concept of Trauma occurs with Bowlby, which places it for the first time in a "relational" context. He argues that the way people react in adverse life situations, particularly to a traumatic event, depends on the type of attachment that has been established between the child and his attachment figures (AFs). The concept of "child abuse and neglect" includes different forms of violence against children, ranging from verbal abuse to rape. Law 66 of 15 February 1996 introduced specific rules on child sexual abuse, in particular the way of listening to children in order to collect good testimony. The theory that today represents the point of reference for most research on the accuracy of memory in testimony, considers memory a "reconstructive" process, and is the result of the interaction between interpretation that is given by the subject in the coding phase, recovery of clues based on the general knowledge possessed by the subject and the context in which it is in the moment in which it must remember. Loftus' studies on false memories affirm that eye witnessing, however bona fide it may be, can be completely unreliable because there are many distortions of memory. The problem of suggestibility in memory is not so much that the momentary account can be modified, but that a distortion of the original episode of what is represented in memory of the event in question takes place, which, from that moment on, will be irreversibly modified. The therapeutic crisis support is the first phase of the therapeutic work following the abuse and has as its privileged recipients the victim and the adult who takes care of them. Currently, a trauma-focused therapy such as EMDR (Eye Movement Desensitization and Reprocessing), an evidence-based psychotherapy approach, is used, recognized by the World Health Organization (WHO) as the elective therapy for the treatment of PTSD and several psychopathologies related to traumatic events, including sexual abuse. Not only because the victims of abuse could in turn perpetrate the cycle of abuse, but also so that victimisation is not considered an unchangeable characteristic of the person.


2010 ◽  
Vol 44 (4) ◽  
pp. 406-423
Author(s):  
O. A. Gokov

AbstractIn the article the review of military secret service of Russia in Africa in the second half of XIX – beginning of XX centuries on the example of activity of officers of the General staff is given. It is showed that military secret service of Russia on the African continent did not carry system character. Russian officers of the General staff in the countries of Africa in the second half XIX – XX beginning of centuries collected the military and political information. They also came forward as researchers, collecting and analysing geographical information about of the probed regions, their population, fauna and flora.


2015 ◽  
Vol 3 (1) ◽  
pp. 45-64
Author(s):  
Amy L. Fairchild

The practice of public health begins with surveillance, the identification of individuals with disease. But while not all efforts to monitor morbidity and mortality entail formal notification of individual cases, the name-based reporting of individuals always involves a breach of privacy. The pitched battles over surveillance that marked the first two decades of the AIDS epidemic and, indeed, more recent global debates over the reach of the surveillance state in the name of national security might suggest a kind of timeless, furious battle on the part of those who would be subject to surveillance to defend a 'right to be left alone.' But just as often, indeed, perhaps more often, citizens have claimed a right to be counted, demanding surveillance in the face of unknown health threats. In either case, however, in the United States, regardless of whether communities pushed for or against disease reporting, marked citizen engagement has shaped the politics of surveillance since the 1970s. To be sure, privacy was always at stake. But so, too, were what activists conceived of as the right to be counted and the right to know.


2014 ◽  
Vol 10 (1) ◽  
pp. 162-174 ◽  
Author(s):  
Panos Kapotas

Ever since the days of Van Gend en Loos and Costa, national attitudes to the unilaterally proclaimed supremacy of EU law have invariably captured a great deal of academic and political attention. Since the mid-1990s most national constitutional courts have converged to the interpretative orthodoxy of a qualified acceptance of primacy, couched in a pluralist vision of the relationship between the EU and its Member States. As things stand at the moment, and especially against the backdrop of Declaration 17 of the Lisbon Treaty, primacy is expected to be the constitutionally recognised conflict resolution norm that national courts shall turn to in almost all circumstances.The Greek Council of State in its Judgment 3470/2011 does not break this pattern, even in the face of a politically sensitive issue. When considering whether an irrebuttable presumption of incompatibility between tenderers for public works contracts and owners or main shareholders of media corporations is permissible under EU law, the Greek court unequivocally accepts the relevant ECJ preliminary ruling in Michaniki and recalibrates its interpretation of the national constitution accordingly. In doing so, however, the Council of State reads an obligation for consistent interpretation into the constitution itself, thus turning the doctrine of indirect effect into a pragmatic tool for constitutional pluralism in action.


Sign in / Sign up

Export Citation Format

Share Document