Sentences with phrase «existing intelligence information»

«What the United States said, and it appears in the open documents of this case, is that the disclosure of these documents by order of our courts would be «likely to result in serious damage to US national security and could harm existing intelligence information - sharing between our two governments»,» the foreign secretary said.

Not exact matches

Many years ago, I realized that there are enormous advantages in developing new data - driven services and solutions that provide real - time access to comparative corporate intelligence in ways that could overcome the barriers to information flows that exist within many large businesses.
The natural tendency of existing sources of information and education was to «foster prejudices rather than cultivate intelligence
He said neighbourhood watch safety corps would support existing security agencies with intelligence and information for them to effectively fight crime and make the state safer.
It isn't true artificial intelligence (which as of right now doesn't exist) but it can build upon information to try and determine what results might be relevant to a query.
Frankly, the title is less important than the function, which is to bring the outside into the firm (e.g., client input, market intelligence, competitor intelligence, etc.) and to coordinate the firm's response to that information in ways that (profitably) extend and deepen existing client relationships and establish new ones.
«Similarly, though the U.S. intelligence community is long understood to have routinely provided information to the South African regime regarding the anti-apartheid movement, little specific public information exists about these activities either.»
The legislation raises a plethora of issues and significantly alters the security landscape: It gives the Canadian Security Intelligence Service (CSIS) powers beyond intelligence gathering (to actively target threats and derail plots); creates new offences (criminalizing «terrorist propaganda» and the «promotion of terror»); lowers the legal threshold to trigger detention to those who may carry out an offence from the existing standard of will carry out to may carry out; extends preventive detention for «suspected» terrorists from three days to seven days (inconsistent with the constitutional presumption of innocence); legally entrenches a no fly list; and grants government agencies explicit authority to share private information with domestic and foreiIntelligence Service (CSIS) powers beyond intelligence gathering (to actively target threats and derail plots); creates new offences (criminalizing «terrorist propaganda» and the «promotion of terror»); lowers the legal threshold to trigger detention to those who may carry out an offence from the existing standard of will carry out to may carry out; extends preventive detention for «suspected» terrorists from three days to seven days (inconsistent with the constitutional presumption of innocence); legally entrenches a no fly list; and grants government agencies explicit authority to share private information with domestic and foreiintelligence gathering (to actively target threats and derail plots); creates new offences (criminalizing «terrorist propaganda» and the «promotion of terror»); lowers the legal threshold to trigger detention to those who may carry out an offence from the existing standard of will carry out to may carry out; extends preventive detention for «suspected» terrorists from three days to seven days (inconsistent with the constitutional presumption of innocence); legally entrenches a no fly list; and grants government agencies explicit authority to share private information with domestic and foreign entities.
Making comparisons to a modern smartphone, the Nvidia medical cloud essentially allows hospitals and medical providers to upload existing data and information collected from patients, create models and leverage the power of artificial intelligence.
In order to identify ownership of cryptocurrency assets, the OFAC will use existing tools, as well as data from law enforcement agencies, secret information from intelligence services and public data.
a b c d e f g h i j k l m n o p q r s t u v w x y z