Search Details

Word: coded (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...officer was dispatched to Currier House to take a report of fraudulent use of a security code...

Author: By Jenifer L. Steinhardt, CRIMSON STAFF WRITER | Title: Police Log | 3/12/2002 | See Source »

...spends more than 90% of its $35 billion annual intelligence budget on spying gadgetry rather than on gathering human intelligence, and most of that money goes not to the CIA but to spy agencies within the Department of Defense, such as the National Security Agency (which does eavesdropping and code breaking) and the National Reconnaissance Office (which flies imagery satellites). The priciest gadgets are not always the ones suited to fighting the terrorist threat. During the past five years, while the U.S. spent billions of dollars to build and launch about half a dozen radar-imaging spy satellites...

Author: /time Magazine | Title: Can We Stop The Next Attack? | 3/11/2002 | See Source »

...Energy Department's top-secret Nuclear Emergency Search Team, based in Nevada. The report said that terrorists were thought to have obtained a 10-kiloton nuclear weapon from the Russian arsenal and planned to smuggle it into New York City. The source of the report was a mercurial agent code-named DRAGONFIRE, who intelligence officials believed was of "undetermined" reliability. But DRAGONFIRE's claim tracked with a report from a Russian general who believed his forces were missing a 10-kiloton device. Since the mid-'90s, proliferation experts have suspected that several portable nuclear devices might be missing from...

Author: /time Magazine | Title: Can We Stop The Next Attack? | 3/11/2002 | See Source »

Here's another example the authors cite: hosting a retirement dinner for the boss at an expensive restaurant, a senior manager was appalled when not one of the young employees bothered to dress up. Although the office dress code is casual, he had assumed employees would know enough to freshen up for the occasion, if only as a sign of respect for their leader...

Author: /time Magazine | Title: Management: Generation Hex? | 3/11/2002 | See Source »

...weeks U.S. forces had been watching as Taliban and al-Qaeda fighters gathered south of Kabul. Code-named Operation Anaconda, the battle plan aimed at this force was a hammer-and-anvil strategy. Friendly Afghans, assisted by U.S. special forces, would flush the enemy from the north and northwest toward three exits of the Shah-i-Kot valley, where American troops waited. To the south, battle positions Heather and Ginger were divided by a hill christened the Whale, while to the east, battle position Eve guarded escape routes over the high mountains to Pakistan. But after two days of fierce...

Author: /time Magazine | Title: Deadly Mission | 3/11/2002 | See Source »

Previous | 382 | 383 | 384 | 385 | 386 | 387 | 388 | 389 | 390 | 391 | 392 | 393 | 394 | 395 | 396 | 397 | 398 | 399 | 400 | 401 | 402 | Next