Word: steals
(lookup in dictionary)
(lookup stats)
Dates: during 2000-2009
Sort By: most recent first
(reverse)
...Fidelity Investments. The company’s pen is a standard Bic, with the only customization being a green cap and Fidelity’s name and logo on the side. Fidelity, if you want to recruit us, don’t give us the kind of pen we steal from Holiday Inn. You’re an investment firm. How good can you being at making money when your pen is a cheap piece of crapsmanship? You’ll face our wrath for eternity. (Unless you give us jobs...
...smirk came back; he stumbled into jargon like SPRo, the nickname for the Strategic Petroleum Reserve and said things that seemed patently out of touch, including the now-infamous remark that no one could have foreseen the levee breaking. His inability to see any moral distinction between those who steal water and those who loot TV sets seemed odd-and at odds with local politicians like New Orleans Mayor Ray Nagin and Louisiana Senator Mary Landrieu. Then where was the call for sacrifice? While southern governors like Georgia Republican Sonny Perdue worried publicly about gas shortfalls as soon as this...
Sure, they couldn't hit. So what? They could hit just enough to scratch and claw and steal a run to win. Literally, a run. At one point, in games decided by one run, they won 12 straight. And then it came. A complete July collapse, followed by an August swoon, a zombie death march. Thirteen straight one-run losses...
...network-intrusion-detection analyst at a major U.S. defense contractor who has been studying Titan Rain since 2003, "but this has been going on so long and it's so well organized that the whole thing is state sponsored, I think." When it comes to advancing their military by stealing data, "the Chinese are more aggressive" than anyone else, David Szady, head of the FBI's counterintelligence unit, told TIME earlier this year. "If they can steal it and do it in five years, why [take longer] to develop...
...needs, and then used with ruthless efficiency against a vast array of U.S. networks. After performing the scans, the source says, it's a virtual certainty that the attackers returned within a day or two and, as they had on dozens of military networks, broke into the computers to steal away as much data as possible without being detected...