Keywords
letters
check-up
unauthorized opening
check-up
unauthorized opening
How to Cite
How to recognise unauthorized opening of our letters? Trassological additions to recognise check-up of a letter. (2019). Academic Journal of Internal Affairs, 67(6), 130-132. https://doi.org/10.38146/BSZ.2019.6.9
Abstract
The author of the following lines spent a few months in a capitalist country for exchange of experiences and now announces his experiences gained at regular observance of his post. During the time of observance (one and a half months) I had the opportunity to check eighteen letters arriving partially from Hungary and partially from abroad. The changes experienced on the letters proved increasingly the suspect that an unauthorized person was in action between sender and receiver – probably for a content review of the letter.
References
Downloads
Download data is not yet available.
Similar Articles
- József Balla, László Kui, Tamás Szele, Factors Influencing the Reintroduction of Border Control , Academic Journal of Internal Affairs: Vol. 67 No. 7-8 (2019)
- Gábor Gecse, Legality and internal control in police operation , Academic Journal of Internal Affairs: Vol. 60 No. 4 (2012)
- Zsolt Kindla, Lifestyle monitoring and indignity procedures , Academic Journal of Internal Affairs: Vol. 65 No. 10 (2017)
- Viktor Lakatos, New trends in international drug enforcement , Academic Journal of Internal Affairs: Vol. 60 No. 6 (2012)
- Endre Bócz, Frame-up trials and authoritarianism , Academic Journal of Internal Affairs: Vol. 64 No. 5 (2016)
- Lénárd Zsákai, József Balla, Mónika Herczeg, László Vájlok, Attila Vedó, János Pető, Testing and evaluation of the Automated Border Control System , Academic Journal of Internal Affairs: Vol. 71 No. 2 (2023)
- Bence Lakatos, Investigation of Smart Tools in Order to Improve the Effectiveness of the Administration of Disaster Management I. , Academic Journal of Internal Affairs: Vol. 69 No. 1. ksz. (2021): Special Issue
- Csaba Szabó, Making Corruption Risk Visible Interview with Dr Mária Temesi and László Kocsis, creators of the KAR-MAP system , Academic Journal of Internal Affairs: Vol. 73 No. 12 (2025)
- László Barnóczki, Mónika Magyar, Resolving the paradox of a transparent secret service , Academic Journal of Internal Affairs: Vol. 67 No. 1 (2019)
- Csaba Kollár, The human dimension of information security: Analysis of social engineering techniques used in security awareness auditing using the SPEAKING model , Academic Journal of Internal Affairs: Vol. 66 No. 2 (2018)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Géza Finszter, László Korinek, István Szikinger is 70 years old , Academic Journal of Internal Affairs: Vol. 70 No. 3 (2022)
- László Korinek, Local Self-Government Police? , Academic Journal of Internal Affairs: Vol. 72 No. 5 (2024)
- Géza Finszter, László Korinek, Facts are stubborn things … The worse for the facts?! , Academic Journal of Internal Affairs: Vol. 69 No. 4 (2021)
- Géza Finszter, László Korinek, Tracing the footsteps of the lost suspicion , Academic Journal of Internal Affairs: Vol. 66 No. 3 (2018)
- Géza Finszter, László Korinek, An interview with Interior Minister Sándor Pintér , Academic Journal of Internal Affairs: Vol. 59 No. 9 (2011)
- László Korinek, New trends , Academic Journal of Internal Affairs: Vol. 61 No. 1 (2013)
- László Korinek, Terrorism , Academic Journal of Internal Affairs: Vol. 63 No. 7-8 (2015)
- László Korinek , Are there criminogenic occupations? , Academic Journal of Internal Affairs: Vol. 71 No. 10 (2023)
- László Korinek, Requiem for a dream , Academic Journal of Internal Affairs: Vol. 70 No. 5 (2022)
- László Korinek, Ferenc Irk: Skeptical Criminology. The Criminal Sociology of the Risk Society , Academic Journal of Internal Affairs: Vol. 60 No. 11 (2012)