• But for Mr Annan, unsurprisingly, that intervention can come only if the Security Council gives its permission.

    ECONOMIST: Sometimes it is a risk that must be taken

  • Civilian or not, nothing goes into or out of the security zone without the permission of the Israeli army.

    ECONOMIST: The great terrain robbery

  • She said she is asking Musharraf for "basic security, " including permission to use vehicles with tinted windows, and private guards in addition to the police guards.

    CNN: Bhutto 'suspicious of regime'

  • After his May 1981 recommendations were rejected, President Reagan proposed a makeshift bargain: the Greenspan commission would be appointed to recommend what ought to be done by Dec. 31, 1982, and, to keep the fund from running dry before then, Social Security should be given permission to borrow from the disability and Medicare funds.

    CNN: A Debt-Threatened Dream

  • In July, on Mr Putin's orders, Russian security services also won official permission to hunt terrorists abroad.

    ECONOMIST: Russian poisonings

  • According to Ministry of Justice information, prisoners are classed as absconders if they absent themselves from prison custody without permission and without overcoming security measures such as fences and locks.

    BBC: Anger at ex-royal aide's escape

  • But their bottom line argument amounted to this: A military commander at a secure overseas military facility in a time of war couldn't remove disruptive lawyers who were inciting captured enemy detainees and endangering the safety and security of military personnel unless he first got permission from a federal judge.

    CENTERFORSECURITYPOLICY: Gitmo's indefensible lawyers

  • As to Libya, Obama's decision to send US forces to Libya without congressional permission makes clear that from his perspective, the UN Security Council, rather than the US Congress, is the source of authority for US military action.

    CENTERFORSECURITYPOLICY: Unmasking the "International Community"

  • According to Nick Nikols, Vice President and GM, Identity, Security, and Windows Management for Quest Software, it is common to find incorrect resource access permission in almost all organizations.

    FORBES: Data Security and Identity Access Management

  • For sensitive data such as telephone numbers, postal and e-mail addresses, social security numbers or financial data, a site would have to explicitly request a user's permission to track and store the information.

    FORBES: Online Advertising

  • Back in 2011, the Department of Homeland Security seemed to be making a push to do something very similar to what the National Counterterrorism Center has gotten permission to do.

    FORBES: The Little Known Spy Agency That Knows Your Flight Plans And Much More

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定