Keywords
letters
check-up
unauthorized opening
check-up
unauthorized opening
How to Cite
How to recognise unauthorized opening of our letters? Trassological additions to recognise check-up of a letter. (2019). Academic Journal of Internal Affairs, 67(6), 130-132. https://doi.org/10.38146/BSZ.2019.6.9
Abstract
The author of the following lines spent a few months in a capitalist country for exchange of experiences and now announces his experiences gained at regular observance of his post. During the time of observance (one and a half months) I had the opportunity to check eighteen letters arriving partially from Hungary and partially from abroad. The changes experienced on the letters proved increasingly the suspect that an unauthorized person was in action between sender and receiver – probably for a content review of the letter.
References
Downloads
Download data is not yet available.
Similar Articles
- József Balla, László Kui, Tamás Szele, Factors Influencing the Reintroduction of Border Control , Academic Journal of Internal Affairs: Vol. 67 No. 7-8 (2019)
- Gábor Gecse, Legality and internal control in police operation , Academic Journal of Internal Affairs: Vol. 60 No. 4 (2012)
- Zsolt Kindla, Lifestyle monitoring and indignity procedures , Academic Journal of Internal Affairs: Vol. 65 No. 10 (2017)
- Viktor Lakatos, New trends in international drug enforcement , Academic Journal of Internal Affairs: Vol. 60 No. 6 (2012)
- Endre Bócz, Frame-up trials and authoritarianism , Academic Journal of Internal Affairs: Vol. 64 No. 5 (2016)
- Lénárd Zsákai, József Balla, Mónika Herczeg, László Vájlok, Attila Vedó, János Pető, Testing and evaluation of the Automated Border Control System , Academic Journal of Internal Affairs: Vol. 71 No. 2 (2023)
- Bence Lakatos, Investigation of Smart Tools in Order to Improve the Effectiveness of the Administration of Disaster Management I. , Academic Journal of Internal Affairs: Vol. 69 No. 1. ksz. (2021): Special Issue
- Csaba Szabó, Making Corruption Risk Visible Interview with Dr Mária Temesi and László Kocsis, creators of the KAR-MAP system , Academic Journal of Internal Affairs: Vol. 73 No. 12 (2025)
- László Barnóczki, Mónika Magyar, Resolving the paradox of a transparent secret service , Academic Journal of Internal Affairs: Vol. 67 No. 1 (2019)
- Csaba Kollár, The human dimension of information security: Analysis of social engineering techniques used in security awareness auditing using the SPEAKING model , Academic Journal of Internal Affairs: Vol. 66 No. 2 (2018)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- László Korinek, Transition in the Ministry of Interior , Academic Journal of Internal Affairs: Vol. 63 No. 1 (2015)
- László Korinek, Postscript to the Specialist Lexicon of Police Science , Academic Journal of Internal Affairs: Vol. 68 No. 11 (2020)
- László Korinek, Anniversaries of a journal , Academic Journal of Internal Affairs: Vol. 70 No. 11 (2022)
- László Korinek, A Tribute of Honor , Academic Journal of Internal Affairs: Vol. 60 No. 3 (2012)
- László Korinek, The bridge , Academic Journal of Internal Affairs: Vol. 68 No. 3 (2020)
- László Korinek, Andrea Kozáry 1953-2020 , Academic Journal of Internal Affairs: Vol. 69 No. 2 (2021)
- László Korinek, Almost thirty of me , Academic Journal of Internal Affairs: Vol. 70 No. 11 (2022)
- László Korinek, Law enforcement in knowledge-based risk society , Academic Journal of Internal Affairs: Vol. 59 No. 1 (2011)
- Géza Finszter, László Korinek, Zsuzsanna Végh, The scientist is a prosecutor: Studies for Endre Bócz's 80th birthday , Academic Journal of Internal Affairs: Vol. 65 No. 7-8 (2017)