Theft
in sentence
234 examples of Theft in a sentence
They fall easily into violence, theft, and sabotage.
The Internet and modern social media are allowing these mass criminal movements to expand their activities beyond kidnapping, extortion, and trafficking in drugs, arms, and people, to include fraud, piracy, information theft, hacking, and sabotage.
The Trump administration is pressuring China to address intellectual-property
theft
and to reduce non-tariff barriers (such as joint-venture requirements).
Though Putin has tried to stoke a popular desire for empire with his Crimea annexation and intervention in eastern Ukraine, these actions amount to little more than open
theft
by masked men in the dead of night; they have little chance of begetting lasting glory.
They object to vast differences in wealth and think large accumulations of it must be the product of theft, not work and risk.
The scale of
theft
achieved by those who ransacked Enron, Worldcom, and other corporations is in the billions of dollars, greater than the GDP of many countries.
Two months before the S&ED, the US Department of Justice indicted five officers of the People’s Liberation Army (PLA) on 31 counts of charges ranging from computer fraud and hacking to identity
theft
and economic espionage.
Budget shortfalls caused by this
theft
helped stoke the explosive inflation Russia experienced in subsequent years.
Will he be able to outmaneuver the National Security Agency as it attempts to force him to return to the United States to stand trial on charges of
theft
and espionage?
Citizens’ attention can be channeled away from, say, major corporate
theft
and government malfeasance toward narratives involving two hapless individuals (and their wives and children, who are usually suffering quite enough without the media’s heavy breathing).
Indeed, widespread
theft
of technology from US companies led to a recent agreement between China and the US that neither government will assist in stealing technology to benefit its country’s firms.
The Chinese government agreed to end government cyber
theft
of industrial technology when then-President Barack Obama met Chinese President Xi Jinping in 2013 and showed the evidence of such activity by the People’s Liberation Army.
But that agreement didn’t cover
theft
by state-owned enterprises and private firms.
Negotiations should cover all forms of technology
theft.
To be sure, Trump is not wrong to confront China over intellectual-property
theft
and flagrant mercantilism.
The European Commission’s agreement in September to postpone full implementation of Ukraine’s association agreement with the European Union – the agreement that Ukrainians fought and died for in Kyiv last winter – signaled to Putin that cunning, force, and intimidation can win Western acquiescence in his subjugation of Ukraine and
theft
of Crimea.
But the NSS is certainly correct in noting that foreign governments hurt American interests by promoting and condoning the
theft
of US intellectual property.
The Chinese accepted the evidence, agreed that stealing industrial technology was different from other forms of espionage, and said that the Chinese government would not assist in such
theft
in the future.
Since that is not enough to stop other Chinese
theft
of US civilian and military technology, the new NSS rightly stresses that the US government will take further steps to stop it.
Looking ahead, the US government should focus on combating foreign governments’ trade policies – such as technology theft, non-tariff barriers to US exports, and forced technology transfers – that hurt American firms without any offsetting benefits to American consumers.
Spying is not a violation of international law (though it often violates various domestic laws), but the US argues that
theft
of intellectual property violates both the spirit and letter of international trade agreements.
The protection against
theft
is obvious: what use is a phone, car, or ticket that will only work for its legitimate owner?
Above all, biometrics can protect against
theft
of our identities themselves.
Thanks to Aadhaar, more than a half-billion people have connected their digital IDs directly to a bank account, allowing the government to deposit over $12 billion without the risk of fraud, theft, or – especially important for women – the male drinking and domestic violence that frequently accompanies sudden infusions of cash.
Indeed, the International Atomic Energy Agency (IAEA) records numerous cases of
theft
and other unauthorized activities involving nuclear and radioactive material every year.
Until corruption, theft, and wasteful and inefficient spending are addressed more vigorously, universal health coverage will remain aspirational.
A fair US policy would also have to refuse Israel’s
theft
of land (via its establishment of exclusively Israeli settlements on occupied territory) and oppose the existence of an apartheid-style regime, whereby an illegal settler minority lives under civil law, and the majority lives under military law.
Given that IUU represents a form of
theft
of national revenues comparable to tax evasion, the G20 has grounds to act on this front.
In 1998, when America complained about seven Moscow Internet addresses involved in the
theft
of Pentagon and NASA secrets, the Russian government replied that phone numbers from which the attacks originated were inoperative.
And most economists agree that the US has genuine trade grievances against China, including intellectual property theft, asymmetrical technology transfers, and non-tariff barriers, such as the requirement that foreign companies enter joint-venture agreements with domestic firms to access the Chinese market.
Back
Next
Related words
Technology
Property
Intellectual
Their
Other
Government
Trade
About
Which
Forced
Companies
Through
Would
Transfer
Nuclear
Including
Country
Without
While
Identity