Search Details

Word: steals (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...concerned when I read that individuals who are supposedly the best and the brightest, the future leaders of society, blatantly steal large amounts of money and betray their friends' trust. Embezzlement, shoplifting, cheating on exams and lying all act to undermine the general welfare. I don't want to preach, but I want to conclude with this thought: if you can't act honestly for unselfish reasons, do it for selfish ones. Do it because it will help to make your life and your society better in the long...

Author: By David H. Goldbrenner, | Title: Finally, Some Honesty! | 4/7/1995 | See Source »

More than the other films, "Decalogue 7"--"Thou shall not steal"--strikingly portrays how opposing figures can play the same roles. Majka bears a child at 16, which her mother claims as her own. Seven years later, Majka decides to steal her daughter back. The role of "thief" is a shared one. Majka may have reason for reclaiming the daughter who was stolen from her, but she is also stealing her daughter from the life that was familiar to her, and the people whom she had loved. Kieslowski turns his lens with equal acuity on each character, sparing...

Author: By Cicely V. Wedgeworth, | Title: Director of 'Red' Brings Epic 'Decalogue' to the MFA | 4/6/1995 | See Source »

...theory, the principle ought to be easy. Looting is wrong, looters have no legal title to the things they steal, and the descendants of those looters do not gain such title merely because a half-century has closed behind the theft. There is not a single object--not a book, not a letter, not a musical manuscript, a drawing, a painting or a vase--that the Russian forces of occupation ripped off from the museums and private collections of Germany and Eastern Europe that should remain, seen or unseen, in Russian hands. And the same goes for what the Germans...

Author: /time Magazine | Title: THE SPOILS OF WAR | 4/3/1995 | See Source »

Federal authorities have warned that hackers can penetrate the Internet's sophisticated security barriers to steal information from companies and universities. But CIA officials believe their own computer system and the new Intelink are practically invulnerable to invasion by outsiders. There will always be the threat of government officials with security clearance who decide to betray their country and download intelligence files. Yet terminals inside Langley are routinely audited for suspicious activity, such as an unusual number of log-ins after hours or repeated failures to have a password accepted, usually symptomatic of a hacker testing out a host...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

...operates over the Pentagon's Defense Systems Network, which has its own lines or leases special lines from phone companies to send encrypted messages. To penetrate that system, a hacker would first have to wiretap a dsnet line, then break the sophisticated encryption of its messages, as well as steal another user's password to get past the main menu...

Author: /time Magazine | Title: SPIES IN CYBERSPACE | 3/20/1995 | See Source »

Previous | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | Next